SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011



Unified Billing-Realization of convergent architecture
       for charging and billing in 4G networks
                                       Prakash.S 1, Kashyap dhruve 2, and C.B.Akki 3
                   1
                       Department of ISE, East Point College of Engineering & Technology, Bangalore, India
                                             Email: prakash_hospet@rediffmail.com
                                 2
                                   Technical Director, Planet-i Technologies, Bangalore, India
                                               Email: kashapdhruve@hotmail.com
                                      3
                                        Senior Consultant, Wipro Technologies, Bangalore
                                               Email: channappa.akki@wipro.com

Abstract—4G is expected to get deployed by many telecom                 network operator. The consumers would have the freedom to
companies in this year. Technologies employed by 4G being               select a service or services provided by one or many providers
tested and going to hit the commercial market soon. When                and obtain a single bill based on their usage. The generation
fully implemented, 4G is expected to offer high speed                   of unified bill for used services from different service providers
transmission and provide seamless handoffs across multiple
                                                                        would be the future scenario. These heterogeneous networks
high speed heterogeneous networks. These heterogeneous
networks on converged platform provide access to varied
                                                                        with multiple operators offering varied services would pose
services over an IPv6 core. Convergence & high speed would              huge accounting and billing challenges. Then it becomes
provide opportunity to end user to use compounded services              necessary to have a common trustworthy platform to regulate
from varied network providers; this will lead to big challenge          & bring transparency in accounting and billing provisions
for accounting, Charging and billing. This paper in                     that facilitate both user and service providers. Currently the
continuation of our previous papers [7][21] discusses a                 consumers are charged based on usage and subscription from
Convergent Framework Architecture (CFA) which provides a                home network service provider. The inter network operator
unified bill to the user for all his compounded usage across            services have not been integrated except while on roaming.
varied network operators. The CFA introduces a trusted third
                                                                        After complete deployment of 4G networks there will complete
party operator called the Convergent Network Operator
(CNO) to achieve a transparent charging, accounting and
                                                                        paradigm shift that would result in an integrated billing
unified billing provisions. The functionality of the CFA is             architectures where consumers would be charged based on
demonstrated with a prototype. We were able to realize unified          their usage of services via a single bill. These kinds of
bill to end user for the usage of different type of service from        architectures would result in consumer independence, better
varied network providers. This concept and business model               quality of services at competitive price and better support
will bring better Quality of service (QoS) not only at                  systems. In this paper we have attempted to realize unified bill
competitive price but also provide independence and choice to           for the user using varied services from varied network
users to opt for specific services from Quality network                 operators. We have proposed a trusted third party convergent
operators. These instructions give you basic guidelines for
                                                                        framework Architecture that need to be established by local
preparing camera-ready papers for ACEEE’s conference
proceedings/Journal Publications.
                                                                        or global governing bodies like the ITU,IEFT, 3GPP,etc. The
                                                                        CFA would also provide freedom to the users in selecting
Index Terms - 4G Networks, Convergent Network Operator,                 varied operators for varied services, the transparent nature of
Convergent framework architecture, Ipv6, Unified Billing,               the CFA would also thrust development of better
                                                                        communication technologies and add to the overall business
                          I. INTRODUCTION                               growth. The CFA considers all the network operators (NWO)
                                                                        with its service providers and other operational partners as a
    The 4G Network would be convergence of heterogeneous
                                                                        single entity.
networks over IPv6 core. The technologies employed by 4G
will be LTE Advanced, WiMax, Ultra Mobile Broadband etc.4G
                                                                                             II. RELATED WORK
will provide high throughput transmission with theoretical
100Mbps download. The world wireless research forum                         There are various architectures for charging, accounting
predicts that around 17 Trillion devices will be connected for          and billing from its emergence [11]. Acceptance and
seven billion people by 2017[6]. Recent survey done on 4G               realization of new architectures is a question of harmonizing
deployment status across globe show that there are 22 LTE               the cost and benefits of deployments both to the users and
technology networks in 16 countries; nearly 50 launches                 the network operators. The new architectures are generally
expected before end of 2011,86 in trail and 168 planned for             demand driven. The growing demand gives birth to new
deployment [18]. There will be multiple services providers;             protocols, new designs and new technologies leading to
equipped with varied technologies offering varied services              betterment of the current deployments. These architectures
for the benefits of the users. Currently users are all Service          are service provider centric and have been deployed at service
Provider bound. They enjoy services provided by their home              provider premises. In these service oriented
                                                                        Architectures[17]; currently consumers of the current mobile
© 2011 ACEEE                                                       26
DOI: 01.IJIT.01.03. 575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


technology are bound to a single network operator. There                 network operator to realize a single bill
exists many SLAs (Service Level Agreements) between                      The CFA mainly constitutes three entities:
Access Provider, Transport Provider, Content Provider and                1.        Convergent Network Operator (CNO)
 service Provider for transperent billing.The network Operator           2.        Network Operators (NWO)
need to adhere with these SLAs for fair and transperent billing          3.        User Nodes or Terminals (UN)
procedures[23]. There are other architectures like                       The CNO is assumed to be a trusted entity that converge all
compensation architecture [5], an UMTS based billing                     the NWOs-UNs on IPv6 core platform. It maintains service
architecture [9][10], and reusable ticket based architectures            level agreements (SLAs) between all the NWOs offering
[25]. These architectures are established as per the 3GPP                varied services. Each user UN is identified by International
standards [1]. Network Intra Operating Agent architecture                Mobile Subscriber Identity (IMSI) for the realization of a single
[23] capable of managing Intra Network Operators using                   bill per UN. The CNO will regulate with its strong SLAs for
various service level agreements (SLA), integrated WLAN,                 providing financial assurance to the NWOs for the usage of
CDMA2000 and Satellite Networks.The ANWIRE project for                   its services. The NWO constitutes Access Providers,
accouting and billing proposes the use of an external third              Transport Providers, Content Providers and Service
party agent for maintenance of authentication, authorization             Providers. It maintains strong SLAs among all these units.
and accounting (AAA) servers [8]. Diameter Attribute Value               The CFA treats NWO as single entity offering varied services
Paris protocol [12] was built to extend the existing AAA                 through physical distribution network. The pricing of the
server deployments for billing and accounting. However this              services offered by NWO is independent of the CFA and the
architecture lacked scalability and reliability. Charging                dynamics of competitive pricing is decided by the NWO itself.
Accounting and Billing service built over an Open Service                The NWO just provides the Charging Function (CF) through
Interface addresses the users or consumers requirement for               a cost matrix. The UN identified by unique IMIE/IMSE number
a one stop billing provision [19][26]. Convergent Service                is an independent entity and has front end application that
Platform [22][16][3] with open service architectures [4][16][26]         will enable to choose any NWO for varied services. The user
could be considered as a solution to these issues which could            (UN) has option to choose any schemes and offer for specific
benefit both the network operators and the users. Governing              service from any NWOs. The UN would get single bill for the
organizations such as 3GPP and other telecommunication                   usage of multiple services from multiple operators. This model
standardizing bodies such as IRTF, IETF, ITU, ETSI, WG5,                 could be considered as an open business model and it would
AAA and AAARCH need to be involved to realize a                          accelerate the provision of enhanced Quality of Service (QoS).
convergent platform. The convergent platform would integrate             In order to provide better QoS and retain UN’s, the NWO’s
over an IPv6 packet switched core[4]. The Billing model of               would need to enhance their current technology and service
these architectures requires the suitable information for billing.       offering propelling technological development.
The table 1 below shows the billing information for respective
                                                                         Basic Operation of the CFA
billing models [3]. The CFA discussed below is designed to
address many issues with respect to single user node billing,                The CFA incorporates the monitoring, billing and charging
financial transaction security, distribution transparency, and           functionality based on the sessions created by the UN. Every
grievance management from both the users and the network                 session is monitored and the UN obtains a unified bill based
operators. As the CFA would provide financial assurance to               on the session usage. Let M denote a set m independent
the network operators and the user nodes, it has to be                   network operators and N be a set of n network services
monitored or established by local or global governing bodies             offered. Each network operator Mi{iõ1,2…m} provides some
like 3GPP, ITU, IEFT, etc.                                               or all of the n services of N. Let P denote the set of p user
                                                                         nodes availing services from the NWO. The Operation of the
        TABLE I: REQUIREMENT INFORMATION OF BILLING MODEL [3]            CFA consists of three Phases: Session Initialization Phase,
                                                                         Service Execution Phase and Accounting and Billing
                                                                         Integration Phase. The UN pi where i õ {1, 2, 3….p} Request
                                                                         For a Service (RFS) ni from a NWO mi. The RFS is considered
                                                                         as an event. An event may vary from making a call, sending a
                                                                         Short Message Service (SMS), E-Mail access etc. Once the
                                                                         NWO receives RFS from the UN pi for a service ni The UN’s
                                                                         location is detected and obtained from the Event Detection
                                                                         Point (EDP). The NWO ascertains whether it could provide
                                                                         that specific service ni at that Location Area Code (LAC)
                                                                         requested by UN pi. This operation to determine the Location
                                                                         Service (LCS) to map specific service for that respective
                                                                         location is carried out by the Service Management Unit of
           III. PROPOSED ARCHTECTURE—CFA                                 the NWO. If the service could be provided, a session is
                                                                         created. Every event initiates a session. Every event begins
   The proposed CFA on converged platform facilitate the
                                                                         with the User Node Identification (UNI) information
users to select their preferred service from the preferred
© 2011 ACEEE                                               27
DOI: 01.IJIT.01.03. 575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


transmission. The UNI is assumed to consist of the IMEI and            The CFA considers the NWO to provide their independent
IMSI. The UN interacts with the physical network maintained            charging function using their Charging Framework. The
 by the Interface Management Unit of the NWO. Once the                 charging of services could be considered based on one of the
NWO receives the UNI it checks its User Management Unit                following parameters [3]:
for any subscription purchased, special pricing offered for               1. Session Time Based Charging
the service ni. The NWO provides the UNI and the information              2. Session Volume Based Charging
from the User Management Unit to the CNO. If the UN has                   3. Session-Event Based Charging.
purchased a subscription the information is confirmed by the              4. Session Content Based Charging
CNO after verifying the UN subscription validity details from             5. Session QoS based Charging
its User Management Unit of the CNO. If the UN has no                     6. User Subscription based Charging
subscription or has a special price offering from the NWO the          Based on the UN pi and the RFS ni the charging function
CNO stores the UN’s RFS into the User Management Unit of               may vary. The Session Management Unit of the NWO
the CNO. Based on the UNI information the CFO ascertains               provides the base units utilized by pi for service ni to be
whether the UN is a pre-paid customer or a post-paid customer.         considered for charging. The base units to be monitored for
If the UN is under the pre-paid scheme, a Session Validity             the service ni is provided by the Charging Framework of the
Time (SVT) based on the balance is calculated and provided             NWO. The Session Management Unit of the NWO monitors
to the NWO. If the UN is under the post – paid scheme the              the user session and in accordance with the Charging
User Credit Rating (UCR) is provided to the NWO. This                  Framework. The NWO provides the base units or parameters
operation is performed for accounting transparency. Once the           utilized to be considered for charging of the session. For
UN credentials are established the NWO provides the charging           example, in a video call, it could be a time based charging
function (CF) to the CNO for accounting and billing. The CF            session. The Session Management unit provides the time
is also updated to the Converged Charging Function (CCF)               units to the Charging Framework where the Charging
maintained by the CNO. A similar CF notification is sent to the        Collection Function (CCF) is established containing the units
UN for confirmation of charge acceptance. Once the                     chargeable, and the per unit price. The charging Data Record
acknowledgment is received with confirmation, the session is           (CDR) which is a product of the Chargeable Units and the CF
activated. The session once established with the NWO mi is             per unit is generated in the Accounting Section of the NWO.
monitored by the Session Management Unit. Through the                  The CDR is sent to the Accounting Management Unit of the
session established the NWO mi provides the service ni                 CNO. The various CDR’s obtained by the CNO are used to
according to the RFS. The session established for service              update the Converged Usage Function (CUF) matrix. The
execution may abruptly be broken by either the user or due to          Accounting Section of the CNO computes a unified
network errors. In such case the Session Management Unit               bill by aggregating all the CDR pertaining to the UN’s. This is
saves the Session Details and provides it to the CNO for               considered as the Accounting and Billing Integration Phase
further handoff operations. If the session is terminated               of the CFA operation.
normally the session details are provided to the Accounting                The security parameters and the protocols for secure
Section of the NWO. Handover Management is another                     communications are established in the Security Framework
important and critical factor considered in the designing of           Layers of the CNO and the NWO. The CFA enables a single
the CFA. The handoff management unit (HMU) is embedded                 bill generation per UN. On receiving payments towards the
into the CNO in the CFA. Once the user credentials are                 usage of services offered or services to be offered, the CNO
established, and the RFS can be serviced by the NWO mi,                distributes the received amount amongst the NWO’s based
the NWO verifies whether the session is a new one or is a              on the UN’s usage. All the financial transactions are realized
continuation to a session services by another NWO. To                  through the Payment Gateways available with the CNO and
ascertain the session type the NWO queries the CNO for the             the NWO. Network Error occurrences or infrastructure
User Session Update (USU). The CNO verifies with its                   malfunctions cannot be ignored in such a huge converged
Accounting Management Unit whether a Charged Data                      4G networks. Such errors would result in grievances from
Record of the UN pi considered exist for the same service.             both the UN’s and the NWO’s. A Reporting Management
The CDR are all time stamped and stored in the accounting              Unit is maintained in the CNO to record all the disparities
management unit of the CNO. If a CDR of the UN pi for the              reported by the UN’s or the NWO’s. The Reporting
same service ni exists within a time interval Ät it could be           Management unit is responsible for resolution of payment
considered as a possible handoff. The possibility of the               and billing discrepancies to enable transparent and rewarding
session to be a handoff is conveyed to the NWO. The NWO                business model for 4G networks. This error management unit
sends a message to the UN querying for Session Restoration             although is very critical but surprisingly not much work has
or New Session. Once the service execution of specific session         been done towards providing solutions. The CFA discussed
is completed; those service utilization details are provided to        above provides an entirely new approach to resolve the issues
the accounting session. Every completed session has a                  related to convergent charging and billing solution yet
corresponding CF associated with it. The CF is established             providing opportunities for overall business growth.
by the NWO and may vary from operator to operator.

© 2011 ACEEE                                                      28
DOI: 01.IJIT.01.03. 575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011




                          Figure 1 Basic Operation of CFA
© 2011 ACEEE                            29
DOI: 01.IJIT.01.03. 575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


The charging Data Record (CDR) which is a product of the              For every CDR generated, the NWO has to update the part of
Chargeable Units and the CF per unit is generated in the              CUF matrix for the usage of requested service by the UN.
Accounting Section of the NWO. The CDR is sent to the                 Every NWO should also update the CCF matrix whenever
Accounting Management Unit of the CNO. The various                    there is any change in the services or their tariffs.
CDR’s obtained by the CNO are used to update the Converged            The Unified Bill for kth user is computed at the CNO level as
Usage Function (CUF) matrix. The Accounting Section of                follows:
the CNO computes a unified bill by aggregating all the CDR            1.        CDR for individual services used by the kth user are
pertaining to the UN’s. This is considered as the Accounting          given as
and Billing Integration Phase of the CFA operation. The
security parameters and the protocols for secure
communications are established in the Security Framework
Layers of the CNO and the NWO. The CFA enables a single
                                                                      2.       Unified Bill is given by
bill generation per UN. On receiving payments towards the
usage of services offered or services to be offered, the CNO
distributes the received amount amongst the NWO’s based
on the UN’s usage. All the financial transactions are realized    3.         This approach will also enable the CNO to provide
through the Payment Gateways available with the CNO and           information on the break-up of unified bill among NWOs.
the NWO. Network Error occurrences or infrastructure              The UN will get information on how much it has been charged
malfunctions cannot be ignored in such a huge converged           for all the services used from a NWO. The bill information for
4G networks. Such errors would result in grievances from          an ith service provider for kth user is given as:
both the UN’s and the NWO’s. A Reporting Management
Unit is maintained in the CNO to record all the disparities
reported by the UN’s or the NWO’s. The Reporting
Management unit is responsible for resolution of payment
and billing discrepancies to enable transparent and rewarding
business model for 4G networks. This error management unit                          V. PROTOTYPE EVALUATION
although is very critical but surprisingly not much work has             A unified bill was realized through the prototype
been done towards providing solutions. The CFA discussed              implementation discussed further in the paper.
above provides an entirely new approach to resolve the issues
related to convergent charging and billing solution yet               Test bed setup
providing opportunities for overall business growth.                      We have created four (NWO1, NWO2, NWO3 & CNO)
                                                                      independent virtual networks on windows host platform using
 IV.MATHAMATICAL MODEL FOR CHARGING AND                               Vmware tools. The User node UN is configured as wireless
              UNIFIED BILLING                                         adapter to access all the four networks. The virtual network
                                                                      editor is used to access multiple network cards on our host
    In the CFA the CNO is responsible for generating the              machine. We have used IPv6 addressing scheme .The
unified bill to UN’s. This is done based on the details of the        functionality of CFA is built on C#.NET .The Inter
CF’s and the service usage details relative to the UN’s               communications between NWOs and communications
obtained from various network providers. This section would           between the NWO and the CNO are implemented using the
discuss the approach adopted by the CNO to derive the                 remote client server concepts. The test bed is shown in the
unified bill. Let us consider a 4G converged network having           figure 2.
m NWOs and each NWO offering n services and these
services used by p UN’s. The accounting management unit
of the CNO considers the Converged Charging Function
(CCF) and the Converged Usage Function (CUF) for bill
generation represented as




Consider the i th NWO maintains CCF[i][1:n] and
CUF[i][1:n][1:p] matrices at its location. Every RFS initiates a
session over which the NWO provides the requested service
and a CDR is generated.                                                                       Fig 2.Testbed
© 2011 ACEEE                                                     30
DOI: 01.IJIT.01.03. 575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


Simulation operations                                                                           CONCLUSIONS
    The test UN sends a RFS for the NWO1 using .NET                       The deployment of 4G will lead to Convergence of all
Remote session. The NWO1 responds to the RFS from the                 heterogeneous networks. The 4G technology and its
test UN by sending CF for acceptance. If the CF is accepted           applications will enable the user to choose varied services
for that type of service; the ACK is sent to NWO1.The CFs             from different network providers. In this paper we have
for that type of service may vary for every NWO. The NWO1             proposed Convergent Framework Architecture that provides
will send the intimation to CNO that the session would be             a unified billing structure for the usage of services from varied
started with UN. The session is activated for the requested           network providers. The experimental study discussed proves
type of service & the same is monitored concurrently with             the possibility of such architecture for unified billing
the CNO. All the data transactions within the CFA are secured         generation. The framework also describes a transparent
through cryptographic means. Once the session is complete             financial model benefitting both the network operators and
and gets disconnected; the usage Charging Data record                 the users. This kind of a convergence would bring about
(CDR) for that type of service is generated & sent to CNO for         robust technological developments owing to cumulative
accounting and unified billing. The same operations take place        business growth targeted towards provision of better services
for other RFSs from UN with different NWOs. The CNO                   to the users at highly market competitive charges. The
calculates and generates Unified bill for UN based on the             realization of such architecture completely relies on the
metrics discussed above.                                              establishment of convergent network operators by local or
                                                                      global governing bodies with strong service level
Simulation Results
                                                                      agreements.
   We have taken three different RFS (Type of service) of
User UN asking service for NWO1, NWO2 and NWO3                                                  REFERENCES
respectively as sample inputs. The usage metrics of UN is
calculated by CNO is as below.                                        [1] 3GPP TS 32.250 V8.0.0 (2008-12): 3rd Generation Partnership
                                                                      Project, Technical Specification Group Service and System Aspects;
                                                                      Telecommunication management, Charging management, Circuit
                                                                      Switched (CS) domain charging, (Release 8)
                                                                      [2] Rajeev prasad, vasileios skaldan “Interconnection and Billing
                                                                      Policies for Personal Networks”ISSN 0085-7130, Telenor ASA
CUF(1,1.1) = [21 + 23 ] = [44secs]
                                                                      2007, Telektronikk 1.2007
CUF(2,2,1) = [46 + 60 ] = [106 bytes]                                 [3] Soo-Duek Kim, Seon-Ho Park, ChangSup Keum, Tai-Myoung
CUF(3,3,1) = [18 + 12 ] = [30 secs]                                   Chung, “A Study new Challenge for Billing System in Converged
                                                                      Service Platform” Networked Computing &Information
                                                                      Management(NCM), 2010,Sixth International conference, ISBN:
                                                                      978-1-4244-7671-8, INSPEC Accession Number: 1153089 Date
                                                                      of current version:16 September 2010
UB[1] = [44 × NWO1 S1] + [ 106×NWO2 S2 ] +                            [4] Peyman TalebiFarda, Terrence Wongb, Victor C.M. Leung
                                                                      “Access and service convergence over the mobile internet – A
[ 30 × NWO3S3]
                                                                      survey” ; Elsevier Publications, Computer Networks -54 (2010)
The figure below represents the usage pattern of the User
                                                                      545–55.
UN with respect to varied services opted from different               [5] George Huitema , Ralph Kühne , Ulrike Meyer , Henk Ensing
Network providers generated from CNO for realization of               , Alf Zugenmaier , Alain Bibase, Olavi Karasti , Frens Jan Rumph ,
unified billing.                                                      Johanneke Siljee “Compensation: Architecture for supporting
                                                                      dynamicity and negotiation in accounting, charging and billing”
                                                                      Elsevier Publications, Computer Communications 33 (2010) 1823–
                                                                      1833.
                                                                      [6] Survey done by wireless research forum www.wireless-world-
                                                                      reasearch.org
                                                                      [7] Prakash.S , C.B.Akki , Kashyap Dhruve , “Handoff
                                                                      Management Architecture for 4G Networks over MIPv6”,
                                                                      International Journal of Computer Science and Network Security,
                                                                      VOL.10 No.2, February 2010
                                                                      [8] N. Alonistioti1, N. Passas, A. Kaloxylos, H. Chaouchi, M.
                                                                      Siebert, M. O’Droma, I. Ganchev, C. Bader Faouzi; “Business
                                                                      Model and Generic Architecture for Integrated Systems and Services:
                                                                      The ANWIRE Approach” (White paper); Proceedings of WWRF
                                                                      8bis meeting, February Bijing, pp. 26-27.
                                                                      [9] Ary B D, Debrei G, Imre S,(2005) “Real-time Charging in Third-
                                                                      generation Mobile Networks”In: ConTEL 2005. Proceedings of
                                                                      the 8th International Conference on Telecommunications, Zagreb,
                                                                      Horvátország, 2005.06.15-2005.06.17.pp. 239-245.
                    Fig 3.User usage pattern

© 2011 ACEEE                                                     31
DOI: 01.IJIT.01.03.575
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


[10] John Cushnie: Charging and Billing for Future Mobile Internet          [21] “Trusted Convergence operator –A conciliate solution to
Services, First Year PhD Research Report, September 2000                    accounting, charging and unified billing in 4G Networks” by
[11] Vassiliy Kornev , “Choosing a platform for a billing system”           “Prakash S, C. B. Akki and Kashyap Dhruve” to be published in
; Master’s Thesis, 2008 , Department of Information Technology ,            Vol.3, No.5, October 2011, IJCEE.
Lappeenranta University of Technology.                                       [22]NGOSS Life Cycle and Methodology; GB927, version 1.1,
[12] Alexandros Tsakountakis *, Georgios Kambourakis, Stefanos              Tele-Management Forum April 2004
Gritzalis ; “A generic accounting scheme for next generation                [23] Shantidev Mohanty , Jiang Xie , “Performance analysis of a
networks” ; Elsevier Publications , Computer Networks 53 (2009)             novel architecture to integrate heterogeneous wireless systems”
2408–2426                                                                   Elsevier Publications , Computer Networks 51 (2007) 1095–1105
[13] Cisco Public Information 2009; “Cisco Mobile Service -Aware            [24] Key Pousttchi ; “ A modeling approach and reference models
Charging Increases Operator revenue http://www.cisco.com/en/US/             for the analysis of mobile payment use cases” , Elsevier Publications
products/ps6401/index.html                                                  , Electronic Commerce Research and Applications 7 (2008) 182–
[14] M A Bihina Bella, J.H.P. Eloff, and M.S Olivier, University            201
of Pretoria, “Requirements for Next-Generation networks billing             [25] Yaohui Lei, Alejandro Quintero, Samuel Pierre; “Mobile
systems”; SATNAC September 2004.                                            services access and payment through reusable tickets” Elsevier
 [15]Paul Gerhardt Schierz , Oliver Schilke , Bernd W. Wirtz ;              Publications , Computer Communications 32 (2009) 602–610
 “ Understanding consumer acceptance of mobile payment services:            [26] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia
An empirical analysis” , Elsevier Publications , Electronic Commerce        Alonistioti , Lazaros Merakos , “A Platform for Charging, Billing
Research and Applications 9 (2010) 209–216.                                 & Accounting in Future Mobile Networks”, Elsevier Computer
[16] Sasu Tarkoma , Jordi Rovira , Erwin Postmann , Hariharan               Communications, Computer Communications 30 (2007) 516–526.
Rajasekaran , Ernö Kovacs ; “Creating Converged Services for                [27] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia
IMS Using the SPICE Service Platform” , ICIN 2007 ,October                  Alonistioti , Lazaros Merakos , “A Platform for Charging, Billing
2007                                                                        & Accounting in Future Mobile Networks”, Elsevier Computer
[17] Vangelis Gazis , Maria Koutsopoulou , Charalampos Farmakis             Communications, Computer Communications 30 (2007) 516–526.
, Alexandros Kaloxylos ; “A Flexible Charging & Billing Approach            [28] Pablo Vidales , Glenford Mapp , Frank Stajano , Jon Crowcroft
for the Emerging UMTS Network Operator Role” Applied                        , Carlos Jes´us Bernardos ; “A Practical Approach for 4G Systems:
Telecommunication Symposium-April-2001,PP 21-26                             Deployment of Overlay Networks” Proceeding TRIDENTCOM
[18] Global 3G and 4G Deployment Status HSPA / HSPA+ / LTE                  ’05 Proceedings of the First International Conference on Test-beds
/July 11, 2011, Source: Informa Telecoms & HSPA+Media, 4G                   and Research Infrastructures for the Development of Networks
Americas, Public Announcements.www.4gamericas.org                           and communities IEEE Computer Society Washington, DC, USA
[19] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia                 ISBN:0-7695-2219-X doi:10.1109/TRIDNT.2005.4
Alonistioti , Lazaros Merakos ; “A Holistic Solution for Charging,          [29] Jarmo Harno “Impact of 3G and beyond technology
Billing & Accounting 4G Mobile Systems” Vehicular Technology                development and pricing on mobile data service provisioning, usage
Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th, Volume: 4                and diffusion” Elsevier Publications, Telematics and Informatics
10.1109/VETECS.2004.1390676, Page(s):2257 - 2260                            27 (2010) 269–282
[20] HP Real-time Charging Solutions; HP IUM Charging Manager,
Communications media and Entertainment Solutions, 4AA2-
0490ENW, June, 2008;www.hp.com/go/cme




© 2011 ACEEE                                                           32
DOI: 01.IJIT.01.03. 575

Mais conteúdo relacionado

Mais procurados

Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
 
An optimum dynamic priority-based call admission control scheme for universal...
An optimum dynamic priority-based call admission control scheme for universal...An optimum dynamic priority-based call admission control scheme for universal...
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
 
4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in IndonesiaKuncoro Wastuwibowo
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanJustus @GreenPacket
 
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...IJCNCJournal
 
Mobile Backhaul Trends and Telcos% Strategies
Mobile Backhaul Trends and Telcos% StrategiesMobile Backhaul Trends and Telcos% Strategies
Mobile Backhaul Trends and Telcos% StrategiesReportLinker.com
 
Billing World Award Essay 2005
Billing World Award Essay 2005Billing World Award Essay 2005
Billing World Award Essay 2005Anthony Kim
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanGreen Packet
 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEiosrjce
 
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...Associate Professor in VSB Coimbatore
 
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...CSCJournals
 
Crsm 2 2009 Bill Lehr Mit Policy And Business Issues Of Heterogeneous Wi...
Crsm 2  2009   Bill Lehr Mit   Policy And Business Issues Of Heterogeneous Wi...Crsm 2  2009   Bill Lehr Mit   Policy And Business Issues Of Heterogeneous Wi...
Crsm 2 2009 Bill Lehr Mit Policy And Business Issues Of Heterogeneous Wi...imec.archive
 
The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
 
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...sardarBityaan
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Justus @GreenPacket
 

Mais procurados (19)

7.chapter
7.chapter7.chapter
7.chapter
 
Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocol
 
An optimum dynamic priority-based call admission control scheme for universal...
An optimum dynamic priority-based call admission control scheme for universal...An optimum dynamic priority-based call admission control scheme for universal...
An optimum dynamic priority-based call admission control scheme for universal...
 
4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia4G Mobile Opportunities & Challenges in Indonesia
4G Mobile Opportunities & Challenges in Indonesia
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlan
 
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...
 
Mobile Backhaul Trends and Telcos% Strategies
Mobile Backhaul Trends and Telcos% StrategiesMobile Backhaul Trends and Telcos% Strategies
Mobile Backhaul Trends and Telcos% Strategies
 
Billing World Award Essay 2005
Billing World Award Essay 2005Billing World Award Essay 2005
Billing World Award Essay 2005
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
 
F0353743
F0353743F0353743
F0353743
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
 
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...
Rethinking of Cognitive Network for Mobile Data Offloading in Unlicensed Spec...
 
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...
 
Crsm 2 2009 Bill Lehr Mit Policy And Business Issues Of Heterogeneous Wi...
Crsm 2  2009   Bill Lehr Mit   Policy And Business Issues Of Heterogeneous Wi...Crsm 2  2009   Bill Lehr Mit   Policy And Business Issues Of Heterogeneous Wi...
Crsm 2 2009 Bill Lehr Mit Policy And Business Issues Of Heterogeneous Wi...
 
In
InIn
In
 
The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)The SAHARA Model for Service Composition Across Multiple Providers (2002)
The SAHARA Model for Service Composition Across Multiple Providers (2002)
 
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2
 

Semelhante a Unified Billing-Realization of convergent architecture for charging and billing in 4G networks

The Customer is Not Right, When it Comes to Roaming Service (disponible en es...
The Customer is Not Right, When it Comes to Roaming Service (disponible en es...The Customer is Not Right, When it Comes to Roaming Service (disponible en es...
The Customer is Not Right, When it Comes to Roaming Service (disponible en es...Cisco Service Provider Mobility
 
Multiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks ManagementMultiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks Managementrahulmonikasharma
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...accenture
 
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...Heather Strinden
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksEricsson
 
Ericsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent NetworksSusma S
 
Sb wireless-mobile
Sb wireless-mobileSb wireless-mobile
Sb wireless-mobile佳钐 赵
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
5G vision-brochure-v1
5G vision-brochure-v15G vision-brochure-v1
5G vision-brochure-v1Sitha Sok
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 

Semelhante a Unified Billing-Realization of convergent architecture for charging and billing in 4G networks (20)

The Customer is Not Right, When it Comes to Roaming Service (disponible en es...
The Customer is Not Right, When it Comes to Roaming Service (disponible en es...The Customer is Not Right, When it Comes to Roaming Service (disponible en es...
The Customer is Not Right, When it Comes to Roaming Service (disponible en es...
 
Multiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks ManagementMultiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks Management
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
 
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...
Analysis Of Operator XL Axiata S Readiness On IP Based Voice Interconnection ...
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networks
 
Ericsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecoms
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
S01725119124
S01725119124S01725119124
S01725119124
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 
Sb wireless-mobile
Sb wireless-mobileSb wireless-mobile
Sb wireless-mobile
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
5G vision-brochure-v1
5G vision-brochure-v15G vision-brochure-v1
5G vision-brochure-v1
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
Ain overview
Ain overviewAin overview
Ain overview
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Unified Billing-Realization of convergent architecture for charging and billing in 4G networks

  • 1. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 Unified Billing-Realization of convergent architecture for charging and billing in 4G networks Prakash.S 1, Kashyap dhruve 2, and C.B.Akki 3 1 Department of ISE, East Point College of Engineering & Technology, Bangalore, India Email: prakash_hospet@rediffmail.com 2 Technical Director, Planet-i Technologies, Bangalore, India Email: kashapdhruve@hotmail.com 3 Senior Consultant, Wipro Technologies, Bangalore Email: channappa.akki@wipro.com Abstract—4G is expected to get deployed by many telecom network operator. The consumers would have the freedom to companies in this year. Technologies employed by 4G being select a service or services provided by one or many providers tested and going to hit the commercial market soon. When and obtain a single bill based on their usage. The generation fully implemented, 4G is expected to offer high speed of unified bill for used services from different service providers transmission and provide seamless handoffs across multiple would be the future scenario. These heterogeneous networks high speed heterogeneous networks. These heterogeneous networks on converged platform provide access to varied with multiple operators offering varied services would pose services over an IPv6 core. Convergence & high speed would huge accounting and billing challenges. Then it becomes provide opportunity to end user to use compounded services necessary to have a common trustworthy platform to regulate from varied network providers; this will lead to big challenge & bring transparency in accounting and billing provisions for accounting, Charging and billing. This paper in that facilitate both user and service providers. Currently the continuation of our previous papers [7][21] discusses a consumers are charged based on usage and subscription from Convergent Framework Architecture (CFA) which provides a home network service provider. The inter network operator unified bill to the user for all his compounded usage across services have not been integrated except while on roaming. varied network operators. The CFA introduces a trusted third After complete deployment of 4G networks there will complete party operator called the Convergent Network Operator (CNO) to achieve a transparent charging, accounting and paradigm shift that would result in an integrated billing unified billing provisions. The functionality of the CFA is architectures where consumers would be charged based on demonstrated with a prototype. We were able to realize unified their usage of services via a single bill. These kinds of bill to end user for the usage of different type of service from architectures would result in consumer independence, better varied network providers. This concept and business model quality of services at competitive price and better support will bring better Quality of service (QoS) not only at systems. In this paper we have attempted to realize unified bill competitive price but also provide independence and choice to for the user using varied services from varied network users to opt for specific services from Quality network operators. We have proposed a trusted third party convergent operators. These instructions give you basic guidelines for framework Architecture that need to be established by local preparing camera-ready papers for ACEEE’s conference proceedings/Journal Publications. or global governing bodies like the ITU,IEFT, 3GPP,etc. The CFA would also provide freedom to the users in selecting Index Terms - 4G Networks, Convergent Network Operator, varied operators for varied services, the transparent nature of Convergent framework architecture, Ipv6, Unified Billing, the CFA would also thrust development of better communication technologies and add to the overall business I. INTRODUCTION growth. The CFA considers all the network operators (NWO) with its service providers and other operational partners as a The 4G Network would be convergence of heterogeneous single entity. networks over IPv6 core. The technologies employed by 4G will be LTE Advanced, WiMax, Ultra Mobile Broadband etc.4G II. RELATED WORK will provide high throughput transmission with theoretical 100Mbps download. The world wireless research forum There are various architectures for charging, accounting predicts that around 17 Trillion devices will be connected for and billing from its emergence [11]. Acceptance and seven billion people by 2017[6]. Recent survey done on 4G realization of new architectures is a question of harmonizing deployment status across globe show that there are 22 LTE the cost and benefits of deployments both to the users and technology networks in 16 countries; nearly 50 launches the network operators. The new architectures are generally expected before end of 2011,86 in trail and 168 planned for demand driven. The growing demand gives birth to new deployment [18]. There will be multiple services providers; protocols, new designs and new technologies leading to equipped with varied technologies offering varied services betterment of the current deployments. These architectures for the benefits of the users. Currently users are all Service are service provider centric and have been deployed at service Provider bound. They enjoy services provided by their home provider premises. In these service oriented Architectures[17]; currently consumers of the current mobile © 2011 ACEEE 26 DOI: 01.IJIT.01.03. 575
  • 2. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 technology are bound to a single network operator. There network operator to realize a single bill exists many SLAs (Service Level Agreements) between The CFA mainly constitutes three entities: Access Provider, Transport Provider, Content Provider and 1. Convergent Network Operator (CNO) service Provider for transperent billing.The network Operator 2. Network Operators (NWO) need to adhere with these SLAs for fair and transperent billing 3. User Nodes or Terminals (UN) procedures[23]. There are other architectures like The CNO is assumed to be a trusted entity that converge all compensation architecture [5], an UMTS based billing the NWOs-UNs on IPv6 core platform. It maintains service architecture [9][10], and reusable ticket based architectures level agreements (SLAs) between all the NWOs offering [25]. These architectures are established as per the 3GPP varied services. Each user UN is identified by International standards [1]. Network Intra Operating Agent architecture Mobile Subscriber Identity (IMSI) for the realization of a single [23] capable of managing Intra Network Operators using bill per UN. The CNO will regulate with its strong SLAs for various service level agreements (SLA), integrated WLAN, providing financial assurance to the NWOs for the usage of CDMA2000 and Satellite Networks.The ANWIRE project for its services. The NWO constitutes Access Providers, accouting and billing proposes the use of an external third Transport Providers, Content Providers and Service party agent for maintenance of authentication, authorization Providers. It maintains strong SLAs among all these units. and accounting (AAA) servers [8]. Diameter Attribute Value The CFA treats NWO as single entity offering varied services Paris protocol [12] was built to extend the existing AAA through physical distribution network. The pricing of the server deployments for billing and accounting. However this services offered by NWO is independent of the CFA and the architecture lacked scalability and reliability. Charging dynamics of competitive pricing is decided by the NWO itself. Accounting and Billing service built over an Open Service The NWO just provides the Charging Function (CF) through Interface addresses the users or consumers requirement for a cost matrix. The UN identified by unique IMIE/IMSE number a one stop billing provision [19][26]. Convergent Service is an independent entity and has front end application that Platform [22][16][3] with open service architectures [4][16][26] will enable to choose any NWO for varied services. The user could be considered as a solution to these issues which could (UN) has option to choose any schemes and offer for specific benefit both the network operators and the users. Governing service from any NWOs. The UN would get single bill for the organizations such as 3GPP and other telecommunication usage of multiple services from multiple operators. This model standardizing bodies such as IRTF, IETF, ITU, ETSI, WG5, could be considered as an open business model and it would AAA and AAARCH need to be involved to realize a accelerate the provision of enhanced Quality of Service (QoS). convergent platform. The convergent platform would integrate In order to provide better QoS and retain UN’s, the NWO’s over an IPv6 packet switched core[4]. The Billing model of would need to enhance their current technology and service these architectures requires the suitable information for billing. offering propelling technological development. The table 1 below shows the billing information for respective Basic Operation of the CFA billing models [3]. The CFA discussed below is designed to address many issues with respect to single user node billing, The CFA incorporates the monitoring, billing and charging financial transaction security, distribution transparency, and functionality based on the sessions created by the UN. Every grievance management from both the users and the network session is monitored and the UN obtains a unified bill based operators. As the CFA would provide financial assurance to on the session usage. Let M denote a set m independent the network operators and the user nodes, it has to be network operators and N be a set of n network services monitored or established by local or global governing bodies offered. Each network operator Mi{iõ1,2…m} provides some like 3GPP, ITU, IEFT, etc. or all of the n services of N. Let P denote the set of p user nodes availing services from the NWO. The Operation of the TABLE I: REQUIREMENT INFORMATION OF BILLING MODEL [3] CFA consists of three Phases: Session Initialization Phase, Service Execution Phase and Accounting and Billing Integration Phase. The UN pi where i õ {1, 2, 3….p} Request For a Service (RFS) ni from a NWO mi. The RFS is considered as an event. An event may vary from making a call, sending a Short Message Service (SMS), E-Mail access etc. Once the NWO receives RFS from the UN pi for a service ni The UN’s location is detected and obtained from the Event Detection Point (EDP). The NWO ascertains whether it could provide that specific service ni at that Location Area Code (LAC) requested by UN pi. This operation to determine the Location Service (LCS) to map specific service for that respective location is carried out by the Service Management Unit of III. PROPOSED ARCHTECTURE—CFA the NWO. If the service could be provided, a session is created. Every event initiates a session. Every event begins The proposed CFA on converged platform facilitate the with the User Node Identification (UNI) information users to select their preferred service from the preferred © 2011 ACEEE 27 DOI: 01.IJIT.01.03. 575
  • 3. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 transmission. The UNI is assumed to consist of the IMEI and The CFA considers the NWO to provide their independent IMSI. The UN interacts with the physical network maintained charging function using their Charging Framework. The by the Interface Management Unit of the NWO. Once the charging of services could be considered based on one of the NWO receives the UNI it checks its User Management Unit following parameters [3]: for any subscription purchased, special pricing offered for 1. Session Time Based Charging the service ni. The NWO provides the UNI and the information 2. Session Volume Based Charging from the User Management Unit to the CNO. If the UN has 3. Session-Event Based Charging. purchased a subscription the information is confirmed by the 4. Session Content Based Charging CNO after verifying the UN subscription validity details from 5. Session QoS based Charging its User Management Unit of the CNO. If the UN has no 6. User Subscription based Charging subscription or has a special price offering from the NWO the Based on the UN pi and the RFS ni the charging function CNO stores the UN’s RFS into the User Management Unit of may vary. The Session Management Unit of the NWO the CNO. Based on the UNI information the CFO ascertains provides the base units utilized by pi for service ni to be whether the UN is a pre-paid customer or a post-paid customer. considered for charging. The base units to be monitored for If the UN is under the pre-paid scheme, a Session Validity the service ni is provided by the Charging Framework of the Time (SVT) based on the balance is calculated and provided NWO. The Session Management Unit of the NWO monitors to the NWO. If the UN is under the post – paid scheme the the user session and in accordance with the Charging User Credit Rating (UCR) is provided to the NWO. This Framework. The NWO provides the base units or parameters operation is performed for accounting transparency. Once the utilized to be considered for charging of the session. For UN credentials are established the NWO provides the charging example, in a video call, it could be a time based charging function (CF) to the CNO for accounting and billing. The CF session. The Session Management unit provides the time is also updated to the Converged Charging Function (CCF) units to the Charging Framework where the Charging maintained by the CNO. A similar CF notification is sent to the Collection Function (CCF) is established containing the units UN for confirmation of charge acceptance. Once the chargeable, and the per unit price. The charging Data Record acknowledgment is received with confirmation, the session is (CDR) which is a product of the Chargeable Units and the CF activated. The session once established with the NWO mi is per unit is generated in the Accounting Section of the NWO. monitored by the Session Management Unit. Through the The CDR is sent to the Accounting Management Unit of the session established the NWO mi provides the service ni CNO. The various CDR’s obtained by the CNO are used to according to the RFS. The session established for service update the Converged Usage Function (CUF) matrix. The execution may abruptly be broken by either the user or due to Accounting Section of the CNO computes a unified network errors. In such case the Session Management Unit bill by aggregating all the CDR pertaining to the UN’s. This is saves the Session Details and provides it to the CNO for considered as the Accounting and Billing Integration Phase further handoff operations. If the session is terminated of the CFA operation. normally the session details are provided to the Accounting The security parameters and the protocols for secure Section of the NWO. Handover Management is another communications are established in the Security Framework important and critical factor considered in the designing of Layers of the CNO and the NWO. The CFA enables a single the CFA. The handoff management unit (HMU) is embedded bill generation per UN. On receiving payments towards the into the CNO in the CFA. Once the user credentials are usage of services offered or services to be offered, the CNO established, and the RFS can be serviced by the NWO mi, distributes the received amount amongst the NWO’s based the NWO verifies whether the session is a new one or is a on the UN’s usage. All the financial transactions are realized continuation to a session services by another NWO. To through the Payment Gateways available with the CNO and ascertain the session type the NWO queries the CNO for the the NWO. Network Error occurrences or infrastructure User Session Update (USU). The CNO verifies with its malfunctions cannot be ignored in such a huge converged Accounting Management Unit whether a Charged Data 4G networks. Such errors would result in grievances from Record of the UN pi considered exist for the same service. both the UN’s and the NWO’s. A Reporting Management The CDR are all time stamped and stored in the accounting Unit is maintained in the CNO to record all the disparities management unit of the CNO. If a CDR of the UN pi for the reported by the UN’s or the NWO’s. The Reporting same service ni exists within a time interval Ät it could be Management unit is responsible for resolution of payment considered as a possible handoff. The possibility of the and billing discrepancies to enable transparent and rewarding session to be a handoff is conveyed to the NWO. The NWO business model for 4G networks. This error management unit sends a message to the UN querying for Session Restoration although is very critical but surprisingly not much work has or New Session. Once the service execution of specific session been done towards providing solutions. The CFA discussed is completed; those service utilization details are provided to above provides an entirely new approach to resolve the issues the accounting session. Every completed session has a related to convergent charging and billing solution yet corresponding CF associated with it. The CF is established providing opportunities for overall business growth. by the NWO and may vary from operator to operator. © 2011 ACEEE 28 DOI: 01.IJIT.01.03. 575
  • 4. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 Figure 1 Basic Operation of CFA © 2011 ACEEE 29 DOI: 01.IJIT.01.03. 575
  • 5. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 The charging Data Record (CDR) which is a product of the For every CDR generated, the NWO has to update the part of Chargeable Units and the CF per unit is generated in the CUF matrix for the usage of requested service by the UN. Accounting Section of the NWO. The CDR is sent to the Every NWO should also update the CCF matrix whenever Accounting Management Unit of the CNO. The various there is any change in the services or their tariffs. CDR’s obtained by the CNO are used to update the Converged The Unified Bill for kth user is computed at the CNO level as Usage Function (CUF) matrix. The Accounting Section of follows: the CNO computes a unified bill by aggregating all the CDR 1. CDR for individual services used by the kth user are pertaining to the UN’s. This is considered as the Accounting given as and Billing Integration Phase of the CFA operation. The security parameters and the protocols for secure communications are established in the Security Framework Layers of the CNO and the NWO. The CFA enables a single 2. Unified Bill is given by bill generation per UN. On receiving payments towards the usage of services offered or services to be offered, the CNO distributes the received amount amongst the NWO’s based on the UN’s usage. All the financial transactions are realized 3. This approach will also enable the CNO to provide through the Payment Gateways available with the CNO and information on the break-up of unified bill among NWOs. the NWO. Network Error occurrences or infrastructure The UN will get information on how much it has been charged malfunctions cannot be ignored in such a huge converged for all the services used from a NWO. The bill information for 4G networks. Such errors would result in grievances from an ith service provider for kth user is given as: both the UN’s and the NWO’s. A Reporting Management Unit is maintained in the CNO to record all the disparities reported by the UN’s or the NWO’s. The Reporting Management unit is responsible for resolution of payment and billing discrepancies to enable transparent and rewarding business model for 4G networks. This error management unit V. PROTOTYPE EVALUATION although is very critical but surprisingly not much work has A unified bill was realized through the prototype been done towards providing solutions. The CFA discussed implementation discussed further in the paper. above provides an entirely new approach to resolve the issues related to convergent charging and billing solution yet Test bed setup providing opportunities for overall business growth. We have created four (NWO1, NWO2, NWO3 & CNO) independent virtual networks on windows host platform using IV.MATHAMATICAL MODEL FOR CHARGING AND Vmware tools. The User node UN is configured as wireless UNIFIED BILLING adapter to access all the four networks. The virtual network editor is used to access multiple network cards on our host In the CFA the CNO is responsible for generating the machine. We have used IPv6 addressing scheme .The unified bill to UN’s. This is done based on the details of the functionality of CFA is built on C#.NET .The Inter CF’s and the service usage details relative to the UN’s communications between NWOs and communications obtained from various network providers. This section would between the NWO and the CNO are implemented using the discuss the approach adopted by the CNO to derive the remote client server concepts. The test bed is shown in the unified bill. Let us consider a 4G converged network having figure 2. m NWOs and each NWO offering n services and these services used by p UN’s. The accounting management unit of the CNO considers the Converged Charging Function (CCF) and the Converged Usage Function (CUF) for bill generation represented as Consider the i th NWO maintains CCF[i][1:n] and CUF[i][1:n][1:p] matrices at its location. Every RFS initiates a session over which the NWO provides the requested service and a CDR is generated. Fig 2.Testbed © 2011 ACEEE 30 DOI: 01.IJIT.01.03. 575
  • 6. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 Simulation operations CONCLUSIONS The test UN sends a RFS for the NWO1 using .NET The deployment of 4G will lead to Convergence of all Remote session. The NWO1 responds to the RFS from the heterogeneous networks. The 4G technology and its test UN by sending CF for acceptance. If the CF is accepted applications will enable the user to choose varied services for that type of service; the ACK is sent to NWO1.The CFs from different network providers. In this paper we have for that type of service may vary for every NWO. The NWO1 proposed Convergent Framework Architecture that provides will send the intimation to CNO that the session would be a unified billing structure for the usage of services from varied started with UN. The session is activated for the requested network providers. The experimental study discussed proves type of service & the same is monitored concurrently with the possibility of such architecture for unified billing the CNO. All the data transactions within the CFA are secured generation. The framework also describes a transparent through cryptographic means. Once the session is complete financial model benefitting both the network operators and and gets disconnected; the usage Charging Data record the users. This kind of a convergence would bring about (CDR) for that type of service is generated & sent to CNO for robust technological developments owing to cumulative accounting and unified billing. The same operations take place business growth targeted towards provision of better services for other RFSs from UN with different NWOs. The CNO to the users at highly market competitive charges. The calculates and generates Unified bill for UN based on the realization of such architecture completely relies on the metrics discussed above. establishment of convergent network operators by local or global governing bodies with strong service level Simulation Results agreements. We have taken three different RFS (Type of service) of User UN asking service for NWO1, NWO2 and NWO3 REFERENCES respectively as sample inputs. The usage metrics of UN is calculated by CNO is as below. [1] 3GPP TS 32.250 V8.0.0 (2008-12): 3rd Generation Partnership Project, Technical Specification Group Service and System Aspects; Telecommunication management, Charging management, Circuit Switched (CS) domain charging, (Release 8) [2] Rajeev prasad, vasileios skaldan “Interconnection and Billing Policies for Personal Networks”ISSN 0085-7130, Telenor ASA CUF(1,1.1) = [21 + 23 ] = [44secs] 2007, Telektronikk 1.2007 CUF(2,2,1) = [46 + 60 ] = [106 bytes] [3] Soo-Duek Kim, Seon-Ho Park, ChangSup Keum, Tai-Myoung CUF(3,3,1) = [18 + 12 ] = [30 secs] Chung, “A Study new Challenge for Billing System in Converged Service Platform” Networked Computing &Information Management(NCM), 2010,Sixth International conference, ISBN: 978-1-4244-7671-8, INSPEC Accession Number: 1153089 Date of current version:16 September 2010 UB[1] = [44 × NWO1 S1] + [ 106×NWO2 S2 ] + [4] Peyman TalebiFarda, Terrence Wongb, Victor C.M. Leung “Access and service convergence over the mobile internet – A [ 30 × NWO3S3] survey” ; Elsevier Publications, Computer Networks -54 (2010) The figure below represents the usage pattern of the User 545–55. UN with respect to varied services opted from different [5] George Huitema , Ralph Kühne , Ulrike Meyer , Henk Ensing Network providers generated from CNO for realization of , Alf Zugenmaier , Alain Bibase, Olavi Karasti , Frens Jan Rumph , unified billing. Johanneke Siljee “Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing” Elsevier Publications, Computer Communications 33 (2010) 1823– 1833. [6] Survey done by wireless research forum www.wireless-world- reasearch.org [7] Prakash.S , C.B.Akki , Kashyap Dhruve , “Handoff Management Architecture for 4G Networks over MIPv6”, International Journal of Computer Science and Network Security, VOL.10 No.2, February 2010 [8] N. Alonistioti1, N. Passas, A. Kaloxylos, H. Chaouchi, M. Siebert, M. O’Droma, I. Ganchev, C. Bader Faouzi; “Business Model and Generic Architecture for Integrated Systems and Services: The ANWIRE Approach” (White paper); Proceedings of WWRF 8bis meeting, February Bijing, pp. 26-27. [9] Ary B D, Debrei G, Imre S,(2005) “Real-time Charging in Third- generation Mobile Networks”In: ConTEL 2005. Proceedings of the 8th International Conference on Telecommunications, Zagreb, Horvátország, 2005.06.15-2005.06.17.pp. 239-245. Fig 3.User usage pattern © 2011 ACEEE 31 DOI: 01.IJIT.01.03.575
  • 7. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 [10] John Cushnie: Charging and Billing for Future Mobile Internet [21] “Trusted Convergence operator –A conciliate solution to Services, First Year PhD Research Report, September 2000 accounting, charging and unified billing in 4G Networks” by [11] Vassiliy Kornev , “Choosing a platform for a billing system” “Prakash S, C. B. Akki and Kashyap Dhruve” to be published in ; Master’s Thesis, 2008 , Department of Information Technology , Vol.3, No.5, October 2011, IJCEE. Lappeenranta University of Technology. [22]NGOSS Life Cycle and Methodology; GB927, version 1.1, [12] Alexandros Tsakountakis *, Georgios Kambourakis, Stefanos Tele-Management Forum April 2004 Gritzalis ; “A generic accounting scheme for next generation [23] Shantidev Mohanty , Jiang Xie , “Performance analysis of a networks” ; Elsevier Publications , Computer Networks 53 (2009) novel architecture to integrate heterogeneous wireless systems” 2408–2426 Elsevier Publications , Computer Networks 51 (2007) 1095–1105 [13] Cisco Public Information 2009; “Cisco Mobile Service -Aware [24] Key Pousttchi ; “ A modeling approach and reference models Charging Increases Operator revenue http://www.cisco.com/en/US/ for the analysis of mobile payment use cases” , Elsevier Publications products/ps6401/index.html , Electronic Commerce Research and Applications 7 (2008) 182– [14] M A Bihina Bella, J.H.P. Eloff, and M.S Olivier, University 201 of Pretoria, “Requirements for Next-Generation networks billing [25] Yaohui Lei, Alejandro Quintero, Samuel Pierre; “Mobile systems”; SATNAC September 2004. services access and payment through reusable tickets” Elsevier [15]Paul Gerhardt Schierz , Oliver Schilke , Bernd W. Wirtz ; Publications , Computer Communications 32 (2009) 602–610 “ Understanding consumer acceptance of mobile payment services: [26] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia An empirical analysis” , Elsevier Publications , Electronic Commerce Alonistioti , Lazaros Merakos , “A Platform for Charging, Billing Research and Applications 9 (2010) 209–216. & Accounting in Future Mobile Networks”, Elsevier Computer [16] Sasu Tarkoma , Jordi Rovira , Erwin Postmann , Hariharan Communications, Computer Communications 30 (2007) 516–526. Rajasekaran , Ernö Kovacs ; “Creating Converged Services for [27] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia IMS Using the SPICE Service Platform” , ICIN 2007 ,October Alonistioti , Lazaros Merakos , “A Platform for Charging, Billing 2007 & Accounting in Future Mobile Networks”, Elsevier Computer [17] Vangelis Gazis , Maria Koutsopoulou , Charalampos Farmakis Communications, Computer Communications 30 (2007) 516–526. , Alexandros Kaloxylos ; “A Flexible Charging & Billing Approach [28] Pablo Vidales , Glenford Mapp , Frank Stajano , Jon Crowcroft for the Emerging UMTS Network Operator Role” Applied , Carlos Jes´us Bernardos ; “A Practical Approach for 4G Systems: Telecommunication Symposium-April-2001,PP 21-26 Deployment of Overlay Networks” Proceeding TRIDENTCOM [18] Global 3G and 4G Deployment Status HSPA / HSPA+ / LTE ’05 Proceedings of the First International Conference on Test-beds /July 11, 2011, Source: Informa Telecoms & HSPA+Media, 4G and Research Infrastructures for the Development of Networks Americas, Public Announcements.www.4gamericas.org and communities IEEE Computer Society Washington, DC, USA [19] Maria Koutsopoulou , Alexandros Kaloxylos , Athanassia ISBN:0-7695-2219-X doi:10.1109/TRIDNT.2005.4 Alonistioti , Lazaros Merakos ; “A Holistic Solution for Charging, [29] Jarmo Harno “Impact of 3G and beyond technology Billing & Accounting 4G Mobile Systems” Vehicular Technology development and pricing on mobile data service provisioning, usage Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th, Volume: 4 and diffusion” Elsevier Publications, Telematics and Informatics 10.1109/VETECS.2004.1390676, Page(s):2257 - 2260 27 (2010) 269–282 [20] HP Real-time Charging Solutions; HP IUM Charging Manager, Communications media and Entertainment Solutions, 4AA2- 0490ENW, June, 2008;www.hp.com/go/cme © 2011 ACEEE 32 DOI: 01.IJIT.01.03. 575