1© Copyright Comviva Technologies Limited. 2015
What is Intelligent Broadband Traffic
Management?
2© Copyright Comviva Technologies Limited. 2015
Why Mobile Broadband?
It has witnessed incredible growth in emerging markets. It’s traffic volumes have been
registering exponential growth because of:
1. the rising deployment of 3G networks
2. the accelerated adoption of smartphones
3. the influx of application stores
4. the increasing use of bandwidth-intensive applications, such as video streaming.
3© Copyright Comviva Technologies Limited. 2015
The problem in Managing mobile Broadband:
In peak periods where multiple subscribers attempt- multiple applications, execute
transactions or simply surf the net- to connect to the same telecom network at the same
time, the network faces tremendous pressure. In such cases, the network can trip and cause
internet outage and disconnection, etc.
4© Copyright Comviva Technologies Limited. 2015
Need for Intelligent Broadband Traffic Management
In order to prevent situation of disruption, internet service providers employ
a broadband traffic management system to limit the maximum download and upload speeds.
This arrangement provides a unique end-to- end quality of service (QoS) differentiation with
content adaptation, caching and distributed delivery.
5© Copyright Comviva Technologies Limited. 2015
Advantages of Intelligent Broadband Traffic Management
Creates a more valuable mobile broadband experience
Integrated approach in traffic management and exercising control over network policy
Promotes a fair and balanced usage of network resources.
Operators are able to build customer loyalty by differentiating their offerings as per subscribers’
needs.
Capable of offering a unique and valuable service to the content rights holders and prompts
in providing the best possible customer experience.
6© Copyright Comviva Technologies Limited. 2015
Traffic Prioritization
It assists in prioritizing the different types of broadband traffic directed towards the subscriber.
It is used to create the best possible service when a large chunk of subscribers are trying to
do more online than the given network can physically support at the time. However even in
prioritization, the service subscribed to remains unlimited and there’s no limitation put on line
speed, usage or downloads and has no downside to the practice of prioritization.
By prioritizing some of the time sensitive traffic, the operators are providing the best possible
service and experience, particularly in a relatively slow broadband speed.
7© Copyright Comviva Technologies Limited. 2015
How Intelligent Broadband Traffic Management is achieved?
Policy and Charging Enforcement Function (PCEF): The PCEF process combines the power of deep packed
inspection (DPI), policy enforcement and charging function engines to inspect, adapt and enforce traffic
management policies. It allocates the available resources to streamline traffic flow and achieve advanced traffic
shaping and efficient bandwidth management.
Traffic Detection Function: These are used to enable operators to optimize the delivery and performance
of applications and services, personalize the user experience by providing tiered service plans. Subscribers
can even manage their own usage and monetize network utilization, charging and controlling the usage,
adjusting service availability and the cost.
Traffic Steering: This element enables operators to accelerate service creation and deployment by intelligently
routing traffic to the value-added services, that helps improve efficiency and scale the network services more
effectively. By steering only the relevant traffic to each service in the chain, it achieves operational efficiencies,
optimization and monetize the operator’s network.
8© Copyright Comviva Technologies Limited. 2015
Conclusion
Owing to the complexity and growing load on the network, operators resort to such unbiased
measures, especially when it comes to real-time traffic management. In practice, every telecom
provider has explicitly laid down a Broadband Traffic Management Policy, available for public
disposal, to state it’s method of handling such critical cases beforehand.
The baseline is that such systems don’t stop or deliberately block certain applications; instead they
make sure that the most important, time-sensitive activities get the highest priority.
9© Copyright Comviva Technologies Limited. 2015
Disclaimer
Copyright © 2015: Comviva Technologies Ltd, Registered Office at A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India.
All rights about this document are reserved and shall not be , in whole or in part, copied, photocopied, reproduced, translated, or reduced to any manner
including but not limited to electronic, mechanical, machine readable ,photographic, optic recording or otherwise without prior consent, in writing, of Comviva
Technologies Ltd (the Company).
The information in this document is subject to changes without notice. This describes only the product defined in the introduction of this documentation. This
document is intended for the use of prospective customers of the Company Products Solutions and or Services for the sole purpose of the transaction for which
the document is submitted. No part of it may be reproduced or transmitted in any form or manner whatsoever without the prior written permission of the
company. The Customer, who/which assumes full responsibility for using the document appropriately. The Company welcomes customer comments as part of the
process of continuous development and improvement.
The Company, has made all reasonable efforts to ensure that the information contained in the document are adequate, sufficient and free of material errors and
omissions. The Company will, if necessary, explain issues, which may not be covered by the document. However, the Company does not assume any liability of
whatsoever nature , for any errors in the document except the responsibility to provide correct information when any such error is brought to company’s
knowledge. The Company will not be responsible, in any event, for errors in this document or for any damages, incidental or consequential, including monetary
losses that might arise from the use of this document or of the information contained in it.
This document and the Products, Solutions and Services it describes are intellectual property of the Company and/or of the respective owners thereof, whether
such IPR is registered, registrable, pending for registration, applied for registration or not.
The only warranties for the Company Products, Solutions and Services are set forth in the express warranty statements accompanying its products and services.
Nothing herein should be construed as constituting an additional warranty. The Company shall not be liable for technical or editorial errors or omissions
contained herein.
The Company logo is a trademark of the Company. Other products, names, logos mentioned in this document , if any , may be trademarks of their respective
owners.
Thank you
Visit us at www.mahindracomviva.com
10© Copyright Comviva Technologies Limited. 2015

How to manage Broadband Traffic Intelligently?

  • 1.
    1© Copyright ComvivaTechnologies Limited. 2015 What is Intelligent Broadband Traffic Management?
  • 2.
    2© Copyright ComvivaTechnologies Limited. 2015 Why Mobile Broadband? It has witnessed incredible growth in emerging markets. It’s traffic volumes have been registering exponential growth because of: 1. the rising deployment of 3G networks 2. the accelerated adoption of smartphones 3. the influx of application stores 4. the increasing use of bandwidth-intensive applications, such as video streaming.
  • 3.
    3© Copyright ComvivaTechnologies Limited. 2015 The problem in Managing mobile Broadband: In peak periods where multiple subscribers attempt- multiple applications, execute transactions or simply surf the net- to connect to the same telecom network at the same time, the network faces tremendous pressure. In such cases, the network can trip and cause internet outage and disconnection, etc.
  • 4.
    4© Copyright ComvivaTechnologies Limited. 2015 Need for Intelligent Broadband Traffic Management In order to prevent situation of disruption, internet service providers employ a broadband traffic management system to limit the maximum download and upload speeds. This arrangement provides a unique end-to- end quality of service (QoS) differentiation with content adaptation, caching and distributed delivery.
  • 5.
    5© Copyright ComvivaTechnologies Limited. 2015 Advantages of Intelligent Broadband Traffic Management Creates a more valuable mobile broadband experience Integrated approach in traffic management and exercising control over network policy Promotes a fair and balanced usage of network resources. Operators are able to build customer loyalty by differentiating their offerings as per subscribers’ needs. Capable of offering a unique and valuable service to the content rights holders and prompts in providing the best possible customer experience.
  • 6.
    6© Copyright ComvivaTechnologies Limited. 2015 Traffic Prioritization It assists in prioritizing the different types of broadband traffic directed towards the subscriber. It is used to create the best possible service when a large chunk of subscribers are trying to do more online than the given network can physically support at the time. However even in prioritization, the service subscribed to remains unlimited and there’s no limitation put on line speed, usage or downloads and has no downside to the practice of prioritization. By prioritizing some of the time sensitive traffic, the operators are providing the best possible service and experience, particularly in a relatively slow broadband speed.
  • 7.
    7© Copyright ComvivaTechnologies Limited. 2015 How Intelligent Broadband Traffic Management is achieved? Policy and Charging Enforcement Function (PCEF): The PCEF process combines the power of deep packed inspection (DPI), policy enforcement and charging function engines to inspect, adapt and enforce traffic management policies. It allocates the available resources to streamline traffic flow and achieve advanced traffic shaping and efficient bandwidth management. Traffic Detection Function: These are used to enable operators to optimize the delivery and performance of applications and services, personalize the user experience by providing tiered service plans. Subscribers can even manage their own usage and monetize network utilization, charging and controlling the usage, adjusting service availability and the cost. Traffic Steering: This element enables operators to accelerate service creation and deployment by intelligently routing traffic to the value-added services, that helps improve efficiency and scale the network services more effectively. By steering only the relevant traffic to each service in the chain, it achieves operational efficiencies, optimization and monetize the operator’s network.
  • 8.
    8© Copyright ComvivaTechnologies Limited. 2015 Conclusion Owing to the complexity and growing load on the network, operators resort to such unbiased measures, especially when it comes to real-time traffic management. In practice, every telecom provider has explicitly laid down a Broadband Traffic Management Policy, available for public disposal, to state it’s method of handling such critical cases beforehand. The baseline is that such systems don’t stop or deliberately block certain applications; instead they make sure that the most important, time-sensitive activities get the highest priority.
  • 9.
    9© Copyright ComvivaTechnologies Limited. 2015 Disclaimer Copyright © 2015: Comviva Technologies Ltd, Registered Office at A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India. All rights about this document are reserved and shall not be , in whole or in part, copied, photocopied, reproduced, translated, or reduced to any manner including but not limited to electronic, mechanical, machine readable ,photographic, optic recording or otherwise without prior consent, in writing, of Comviva Technologies Ltd (the Company). The information in this document is subject to changes without notice. This describes only the product defined in the introduction of this documentation. This document is intended for the use of prospective customers of the Company Products Solutions and or Services for the sole purpose of the transaction for which the document is submitted. No part of it may be reproduced or transmitted in any form or manner whatsoever without the prior written permission of the company. The Customer, who/which assumes full responsibility for using the document appropriately. The Company welcomes customer comments as part of the process of continuous development and improvement. The Company, has made all reasonable efforts to ensure that the information contained in the document are adequate, sufficient and free of material errors and omissions. The Company will, if necessary, explain issues, which may not be covered by the document. However, the Company does not assume any liability of whatsoever nature , for any errors in the document except the responsibility to provide correct information when any such error is brought to company’s knowledge. The Company will not be responsible, in any event, for errors in this document or for any damages, incidental or consequential, including monetary losses that might arise from the use of this document or of the information contained in it. This document and the Products, Solutions and Services it describes are intellectual property of the Company and/or of the respective owners thereof, whether such IPR is registered, registrable, pending for registration, applied for registration or not. The only warranties for the Company Products, Solutions and Services are set forth in the express warranty statements accompanying its products and services. Nothing herein should be construed as constituting an additional warranty. The Company shall not be liable for technical or editorial errors or omissions contained herein. The Company logo is a trademark of the Company. Other products, names, logos mentioned in this document , if any , may be trademarks of their respective owners. Thank you Visit us at www.mahindracomviva.com
  • 10.
    10© Copyright ComvivaTechnologies Limited. 2015