This document discusses data mining applications in the telecommunications industry. It notes that telecommunications companies generate and store vast amounts of customer and network data, including call detail records, which are useful for marketing, fraud detection, and network management via data mining. The challenges of mining this data include its enormous size, sequential/temporal nature, and need to predict rare events like fraud. Common applications are marketing to existing customers, fraud detection, and network fault analysis.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
This document discusses how investments in communications technologies can boost a nation's competitiveness globally. It argues that enhancing communications for business workers, such as through integrated access networks, can significantly increase productivity and competitiveness at the national level. The technologies needed to provide advanced communications services to remote business sites, such as small branch offices, are analyzed. These include asynchronous transfer mode (ATM) networks, which can transport data, voice and video in a unified way over a variety of physical layer technologies to create a flexible, non-hierarchical system.
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
The document discusses the increasing challenges mobile network operators face due to exponential growth in signaling from smartphones, applications, and devices. Existing network protection is insufficient to handle signaling storms caused by events that trigger escalating signaling traffic from reconnection attempts. A new end-to-end strategy across network layers is needed to contain overload surges and maximize user service, including mechanisms at the radio network edge, signaling distributors, and user data management systems. The paper focuses on the role of Ericsson's user data management system and mechanisms beyond standards that help networks efficiently handle this scenario and ensure quick, safe recovery.
The Necessity of Network Modernization (Federal) - Full White Paper Sean Leslie
This document discusses how modernizing federal networks through multivendor solutions and open standards can save the government billions of dollars annually in network costs. It outlines several areas where savings can be achieved, such as through increased competition lowering purchase and maintenance prices, simplifying network architectures to reduce training and personnel costs, improving performance, enabling virtualization, fostering innovation, and providing scalable subscription-based services. Overall, the document claims the federal government could save over $5 billion in network costs over five years by shifting to multivendor heterogeneous networks based on open standards.
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
This document discusses challenges at the MAC layer for machine-to-machine (M2M) communications. It first describes issues around efficient, scalable and fair channel access for large numbers of M2M devices. It then discusses application layer protocols used to connect devices and applications to the internet, including CoAP, MQTT, and WebSocket. Finally, it analyzes MAC layer issues for a smart home example using M2M for power management, security and assisted living for the elderly. Key challenges include supporting diverse quality of service needs, large numbers of devices sharing channels, energy efficiency needs, and low-cost hardware requirements.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Document by McKinsey Quarterly (Michael Chui, Markus Löffler, and Roger Roberts)
More objects are becoming embedded with sensors and gaining the ability to communicate. The resulting information networks promise to create new business models, improve business processes, and reduce costs and risks.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
This document discusses how investments in communications technologies can boost a nation's competitiveness globally. It argues that enhancing communications for business workers, such as through integrated access networks, can significantly increase productivity and competitiveness at the national level. The technologies needed to provide advanced communications services to remote business sites, such as small branch offices, are analyzed. These include asynchronous transfer mode (ATM) networks, which can transport data, voice and video in a unified way over a variety of physical layer technologies to create a flexible, non-hierarchical system.
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
The document discusses the increasing challenges mobile network operators face due to exponential growth in signaling from smartphones, applications, and devices. Existing network protection is insufficient to handle signaling storms caused by events that trigger escalating signaling traffic from reconnection attempts. A new end-to-end strategy across network layers is needed to contain overload surges and maximize user service, including mechanisms at the radio network edge, signaling distributors, and user data management systems. The paper focuses on the role of Ericsson's user data management system and mechanisms beyond standards that help networks efficiently handle this scenario and ensure quick, safe recovery.
The Necessity of Network Modernization (Federal) - Full White Paper Sean Leslie
This document discusses how modernizing federal networks through multivendor solutions and open standards can save the government billions of dollars annually in network costs. It outlines several areas where savings can be achieved, such as through increased competition lowering purchase and maintenance prices, simplifying network architectures to reduce training and personnel costs, improving performance, enabling virtualization, fostering innovation, and providing scalable subscription-based services. Overall, the document claims the federal government could save over $5 billion in network costs over five years by shifting to multivendor heterogeneous networks based on open standards.
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
This document discusses challenges at the MAC layer for machine-to-machine (M2M) communications. It first describes issues around efficient, scalable and fair channel access for large numbers of M2M devices. It then discusses application layer protocols used to connect devices and applications to the internet, including CoAP, MQTT, and WebSocket. Finally, it analyzes MAC layer issues for a smart home example using M2M for power management, security and assisted living for the elderly. Key challenges include supporting diverse quality of service needs, large numbers of devices sharing channels, energy efficiency needs, and low-cost hardware requirements.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Document by McKinsey Quarterly (Michael Chui, Markus Löffler, and Roger Roberts)
More objects are becoming embedded with sensors and gaining the ability to communicate. The resulting information networks promise to create new business models, improve business processes, and reduce costs and risks.
This document provides an overview of the OpenMTC platform, which is a generic M2M communication platform that aims to enable machine-to-machine connectivity. The key points are:
1) OpenMTC is based on a client/server RESTful architecture and supports ETSI M2M specifications, including capabilities like communication, application enablement, and security.
2) It provides a standard compliant platform for smart city and M2M services across different vertical domains like transportation, utilities, and healthcare.
3) The platform consists of a gateway service capability layer and network service capability layer that allow interactions between applications and the network using standardized interfaces defined by ETSI.
The document discusses telecommunications networks and applications. It covers topics like major developments in telecommunications technologies, the business value of the internet, intranets and extranets. Components of telecommunications networks are identified as terminals, telecommunications processors, channels and computers. Types of networks explained are WAN, LAN, VPN, client/server, network computing and peer-to-peer. The document also discusses telecommunications media like twisted-pair wire and coaxial cable. Case studies on wireless business applications and using mobile technologies for emergency services are presented.
The document discusses the issue of limited mobile wireless network capacity as demand for data continues to grow exponentially due to increasing use of smartphones, tablets, and cloud-based applications. It notes that wireless network capacity is inherently constrained compared to wired networks. While network upgrades can help alleviate capacity issues temporarily, fundamental business model changes are needed to manage unprofitable network usage and capture more revenue from high-volume data users. Specific technology providers like Broadcom and network upgrade strategies are mentioned as potential ways to address network capacity challenges.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
This document summarizes a case study of applying semantic technology to business intelligence at BT. It describes how BT used semantic annotation and information extraction on large volumes of unstructured sales reports to automatically identify important entities, relationships and trends. This enabled sales managers to gain insights not possible through manual analysis. The system extracted relevant information from the text using tailored rules and ontologies, integrated it with structured data, and presented the findings through a customized dashboard interface. The new semantic-based approach replaced a time-consuming manual process and provided more comprehensive intelligence to support BT's sales teams.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
This document discusses a broadband network system for factory automation. It begins with introducing broadband networks and their ability to transmit multiple signals simultaneously using a wide range of frequencies. It then discusses how broadband networks can support new data transmission needs for personal computing, video conferencing, and entertainment video. The document goes on to discuss wireless sensor networks (broadband networks) and their potential to provide new paradigms for factory automation by integrating sensing, control, computation and communication at each node to form a mesh network. It emphasizes how standardization is important for commercial success of using broadband networks for factory automation applications.
This document proposes a business case for deploying a 4G heterogeneous wireless network in Spain. It describes the network architecture, which includes WiFi, UMTS and WiMAX access networks connected through an IMS core network. The business case analyzes deployment in both an urban area (Barcelona) and a rural area (Caserras). It outlines the assumptions made, including the types of subscriber devices, business models, and logical flows for determining economic results like NPV, IRR, cash flows, payback period and profitability index.
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...IDES Editor
The paper examines the Internet usage and its
market environment in developing countries under the
perceived assumption that the Internet is one of the most
important drivers for development. It gives an insight on
processes’ (both unintended and intended) implications and
their effects on achieving real Internet benefits in the
environments where network infrastructures are limited such
as the ones found in the developing regions. A welfare based
approach is proposed in which the Internet providers and endusers
identify a set of objective that leads them in achieving
increased benefits. Analytical model of the main
characteristics in the approach is presented and eventually
shown how the end user bit rate could be regulated based on
the utility bounds that lead general satisfaction to all users.
User satisfaction signifies delivery of expected QoS and as
well as willing to pay for such services.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
This document provides a review and analysis of communication network schemes for Advanced Metering Infrastructure (AMI). It begins with an overview of AMI components and communication framework, including smart meters, Meter Data Management Systems (MDMS), and the two-layer network of a smart meter network and backhaul network. Popular wired (power line communication, fiber optic) and wireless (cellular, WiFi, ZigBee) communication technologies for AMI are then discussed in terms of their advantages and disadvantages. Finally, a hybrid WiMAX-fiber optic solution is recommended and its performance is evaluated through simulation.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
This work is based on a translation of my MBA monograph whose certification was issued in April 30th, 2010, by FIPE (Fundação Instituto de Pesquisas Econômicas). Some recent information was added to this paper while other information was removed from the original MBA monograph.
Brazil launched in 2010, its National Broadband Plan. The aim is to grow broadband at home from 12 million to 40 million by the end of 2014. This means to provide broadband coverage to 72% of total households of the country.
Government’s expectation is to reduce the broadband cost from around 5% average household income to around 0.2% for the most popular plan (speed up to 512 kbps and download limitation) and to around 0.45% for the plan with speed between 512 kbps and 784 kbps.
The different ways to access the internet are changing the people’s behavior. It can be in the business environment , at home or at any other place.
Statistics show that the number of internet users in Brazil increased at a rate greater than 40% a year between 2000 and 2008 (source: Barômetro Cisco 2009).
As per Ibope Nielsen (Source: Meio & Mensagem, 22/June/2009), the number of internet users reached 62.3 million people in Brazil in the first quarter of 2009. However the number of internet accounts is only 15.05 millions (10.4 million for fixed internet and 4.62 million for wireless broadband internet)
At the same time, Telco’s revenue from circuit switching telephone systems are decreasing due to mobile systems user’s growth and the emergence of VoIP systems.
The need to offer broadband services are introducing great access technological innovations such as VDSL, FTTH, 3G HSPA , WiMAX and LTE.
WiMAX is a wireless broadband access technology for the last mile based on 802.16 standard from the Institute of Electrical and Electronic Engineering (IEEE). WiMAX means Worldwide Interoperability for Microwave Access. This name was introduced by the WiMAX Forum which is an organization with a goal to promote, standardize and define the strategy of WiMAX.
The aim of this work is to capture the most important items that influence the WiMAX business case at 2,5 GHz band and provide insights to minimize risks and uncertainties that occur in the deployment of a WiMAX network. It is shown an example of deployment in São Paulo city, Brazil, containing numbers of base stations, subscribers, payback period and internal rate of return.
The study begins with the analysis of the micro-environment providing a summary containing subscribers forecast for the next years.
It is also described the macro-environment analysis. On the technological environment should be noted the delay in the availability of WiMAX-embedded devices while on the 3G side there are more than 800 hundred devices available worldwide. It is also commented about the LTE technology which is being developed by most of the greater telecommunications vendors. On the legal-political environment, it should be noted the delays on the spectrum auctions and the power of cellular operators which influence the rules for WIMAX such as mobility and spectrum usage restriction.
It is also emphasized the importance of the project planning, scope characterization and definition, work breakdown structure definition containing the decomposition of the work to be executed up to the package level, the activities sequencing, costs involved, risks and response plans, schedule and critical path.
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
Mobile cloud computing combines the capabilities of mobile computing and cloud computing. It allows data storage and processing to occur outside of mobile devices in the cloud. This provides advantages like reduced power consumption and memory/storage constraints for mobile devices. Mobile cloud computing applications include mobile commerce, banking, healthcare, gaming and more. By offloading processing and data to the cloud, these applications can have faster performance and better scalability compared to running solely on mobile devices.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SOA in Telecom describes the benefits of SOA in a Business Domain. The initial section of this document covers the challenges faced by the Telecom Industry and how SOA benefits the industry.
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
This document provides an overview of the OpenMTC platform, which is a generic M2M communication platform that aims to enable machine-to-machine connectivity. The key points are:
1) OpenMTC is based on a client/server RESTful architecture and supports ETSI M2M specifications, including capabilities like communication, application enablement, and security.
2) It provides a standard compliant platform for smart city and M2M services across different vertical domains like transportation, utilities, and healthcare.
3) The platform consists of a gateway service capability layer and network service capability layer that allow interactions between applications and the network using standardized interfaces defined by ETSI.
The document discusses telecommunications networks and applications. It covers topics like major developments in telecommunications technologies, the business value of the internet, intranets and extranets. Components of telecommunications networks are identified as terminals, telecommunications processors, channels and computers. Types of networks explained are WAN, LAN, VPN, client/server, network computing and peer-to-peer. The document also discusses telecommunications media like twisted-pair wire and coaxial cable. Case studies on wireless business applications and using mobile technologies for emergency services are presented.
The document discusses the issue of limited mobile wireless network capacity as demand for data continues to grow exponentially due to increasing use of smartphones, tablets, and cloud-based applications. It notes that wireless network capacity is inherently constrained compared to wired networks. While network upgrades can help alleviate capacity issues temporarily, fundamental business model changes are needed to manage unprofitable network usage and capture more revenue from high-volume data users. Specific technology providers like Broadcom and network upgrade strategies are mentioned as potential ways to address network capacity challenges.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
This document summarizes a case study of applying semantic technology to business intelligence at BT. It describes how BT used semantic annotation and information extraction on large volumes of unstructured sales reports to automatically identify important entities, relationships and trends. This enabled sales managers to gain insights not possible through manual analysis. The system extracted relevant information from the text using tailored rules and ontologies, integrated it with structured data, and presented the findings through a customized dashboard interface. The new semantic-based approach replaced a time-consuming manual process and provided more comprehensive intelligence to support BT's sales teams.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
This document discusses a broadband network system for factory automation. It begins with introducing broadband networks and their ability to transmit multiple signals simultaneously using a wide range of frequencies. It then discusses how broadband networks can support new data transmission needs for personal computing, video conferencing, and entertainment video. The document goes on to discuss wireless sensor networks (broadband networks) and their potential to provide new paradigms for factory automation by integrating sensing, control, computation and communication at each node to form a mesh network. It emphasizes how standardization is important for commercial success of using broadband networks for factory automation applications.
This document proposes a business case for deploying a 4G heterogeneous wireless network in Spain. It describes the network architecture, which includes WiFi, UMTS and WiMAX access networks connected through an IMS core network. The business case analyzes deployment in both an urban area (Barcelona) and a rural area (Caserras). It outlines the assumptions made, including the types of subscriber devices, business models, and logical flows for determining economic results like NPV, IRR, cash flows, payback period and profitability index.
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...IDES Editor
The paper examines the Internet usage and its
market environment in developing countries under the
perceived assumption that the Internet is one of the most
important drivers for development. It gives an insight on
processes’ (both unintended and intended) implications and
their effects on achieving real Internet benefits in the
environments where network infrastructures are limited such
as the ones found in the developing regions. A welfare based
approach is proposed in which the Internet providers and endusers
identify a set of objective that leads them in achieving
increased benefits. Analytical model of the main
characteristics in the approach is presented and eventually
shown how the end user bit rate could be regulated based on
the utility bounds that lead general satisfaction to all users.
User satisfaction signifies delivery of expected QoS and as
well as willing to pay for such services.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
This document provides a review and analysis of communication network schemes for Advanced Metering Infrastructure (AMI). It begins with an overview of AMI components and communication framework, including smart meters, Meter Data Management Systems (MDMS), and the two-layer network of a smart meter network and backhaul network. Popular wired (power line communication, fiber optic) and wireless (cellular, WiFi, ZigBee) communication technologies for AMI are then discussed in terms of their advantages and disadvantages. Finally, a hybrid WiMAX-fiber optic solution is recommended and its performance is evaluated through simulation.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
This work is based on a translation of my MBA monograph whose certification was issued in April 30th, 2010, by FIPE (Fundação Instituto de Pesquisas Econômicas). Some recent information was added to this paper while other information was removed from the original MBA monograph.
Brazil launched in 2010, its National Broadband Plan. The aim is to grow broadband at home from 12 million to 40 million by the end of 2014. This means to provide broadband coverage to 72% of total households of the country.
Government’s expectation is to reduce the broadband cost from around 5% average household income to around 0.2% for the most popular plan (speed up to 512 kbps and download limitation) and to around 0.45% for the plan with speed between 512 kbps and 784 kbps.
The different ways to access the internet are changing the people’s behavior. It can be in the business environment , at home or at any other place.
Statistics show that the number of internet users in Brazil increased at a rate greater than 40% a year between 2000 and 2008 (source: Barômetro Cisco 2009).
As per Ibope Nielsen (Source: Meio & Mensagem, 22/June/2009), the number of internet users reached 62.3 million people in Brazil in the first quarter of 2009. However the number of internet accounts is only 15.05 millions (10.4 million for fixed internet and 4.62 million for wireless broadband internet)
At the same time, Telco’s revenue from circuit switching telephone systems are decreasing due to mobile systems user’s growth and the emergence of VoIP systems.
The need to offer broadband services are introducing great access technological innovations such as VDSL, FTTH, 3G HSPA , WiMAX and LTE.
WiMAX is a wireless broadband access technology for the last mile based on 802.16 standard from the Institute of Electrical and Electronic Engineering (IEEE). WiMAX means Worldwide Interoperability for Microwave Access. This name was introduced by the WiMAX Forum which is an organization with a goal to promote, standardize and define the strategy of WiMAX.
The aim of this work is to capture the most important items that influence the WiMAX business case at 2,5 GHz band and provide insights to minimize risks and uncertainties that occur in the deployment of a WiMAX network. It is shown an example of deployment in São Paulo city, Brazil, containing numbers of base stations, subscribers, payback period and internal rate of return.
The study begins with the analysis of the micro-environment providing a summary containing subscribers forecast for the next years.
It is also described the macro-environment analysis. On the technological environment should be noted the delay in the availability of WiMAX-embedded devices while on the 3G side there are more than 800 hundred devices available worldwide. It is also commented about the LTE technology which is being developed by most of the greater telecommunications vendors. On the legal-political environment, it should be noted the delays on the spectrum auctions and the power of cellular operators which influence the rules for WIMAX such as mobility and spectrum usage restriction.
It is also emphasized the importance of the project planning, scope characterization and definition, work breakdown structure definition containing the decomposition of the work to be executed up to the package level, the activities sequencing, costs involved, risks and response plans, schedule and critical path.
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
Mobile cloud computing combines the capabilities of mobile computing and cloud computing. It allows data storage and processing to occur outside of mobile devices in the cloud. This provides advantages like reduced power consumption and memory/storage constraints for mobile devices. Mobile cloud computing applications include mobile commerce, banking, healthcare, gaming and more. By offloading processing and data to the cloud, these applications can have faster performance and better scalability compared to running solely on mobile devices.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SOA in Telecom describes the benefits of SOA in a Business Domain. The initial section of this document covers the challenges faced by the Telecom Industry and how SOA benefits the industry.
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
The document discusses mobility-sensitive topology control in mobile ad hoc networks (MANETs). It first explains that existing topology control protocols assume a static network without mobility, but in mobile environments network connectivity can be compromised by inconsistent or outdated location information. The paper then proposes a new topology control method that extends existing mobility-insensitive protocols with two mechanisms: consistent local views to avoid inconsistent information and delay/mobility management to tolerate outdated information. Simulation results confirm the effectiveness of the proposed approach.
The document discusses the past continuous tense in English. It explains that the past continuous is used to describe actions that were ongoing in the past. It provides examples of affirmative, negative, and question forms of the past continuous tense, showing that it uses "was/were + verb+ing" and changes the order for questions. Key elements include the subject, was/were, and a verb ending in "-ing".
The games industry has a complex organizational structure to develop video games. Large game companies have different departments that each focus on a specific part of the development process like programming, art, design, and testing. Smaller indie game studios have much smaller teams that may involve only a handful of people taking on varied roles from programming to art to marketing.
Google was founded in 1998 by Larry Page and Sergey Brin. Its mission is to organize the world's information and make it universally accessible. Some of Google's most popular products include Search, Gmail, Maps, Chrome, and Android. The document discusses these products as well as Google's corporate history, web services, and reasons for its success, including a focus on users, speed, and avoiding evil. It also identifies mobile computing as a major opportunity through technological convergence.
The document discusses sales results for various agricultural products in the Jabodetabek area of Indonesia in 2011. It includes graphs of sales of Champs Emulsion, Naturalle Group, and Maxiton products both nationally and specifically in the Jabodetabek region for the company PT. CCM Agripharma.
The document defines capacity building as activities that expand the scale, reach, efficiency, or effectiveness of programs and organizations. Capacity building activities may leverage additional resources for programs and organizations. These activities achieve lasting positive outcomes for beneficiary populations. Capacity building includes indirect services that enable organizations to provide more, better, and sustained direct services. It is intended to support organizational goals of increasing, expanding, or enhancing services and allow organizations to provide sustained services after CNCS involvement ends. Capacity building is not activities solely for administrative support or those that only increase capacity during the term of CNCS service.
The document provides a history of the Syro-Malankara Catholic Church, which originated from a group of 35,000 Syriac Orthodox Christians in Kerala who broke away from that church in 1930 to join the Catholic Church under the leadership of Archbishop Mar Ivanios. The Syro-Malankara Church uses the West Syrian liturgy and its current head is Major Archbishop Baselios Cleemis. It has 500,000 members and 500 priests today. The document also describes the structure of the Syro-Malankara liturgy and provides background on the Coonan Cross Oath of 1653, where St. Thomas Christians swore not to be under Portuguese authority.
Why mincore() returns different value of stat ?Hiroaki Kubota
Analyzer of MongoDB 2.4 's new feature returned ununderstandable results.
The value of "resident" totally different from "pagesInMemory".
But why ?
-"resident" are coming from STAT.
-"pageInMemory" are coming from mincore().
This slide illustrates this issue.
Broan nutone canada green initiatives 2006 2010OssoElectric
Broan takes green seriously. Besides manufacturing products that help consumers save energy, Broan Canada takes steps to reduce their own green consumption.
The document discusses NoSQL databases and how they provide solutions for organizations building interactive web applications that need flexible database technology. It notes that while few organizations can build database software themselves, every organization building web apps needs this technology. It then provides information on the key differences between relational and NoSQL databases, how document databases can accommodate unstructured data through embedding of related objects, and how indexing and querying works with document databases. Examples of document structures are also given.
The document discusses security concerns for cable operators transitioning to digital distribution. It outlines four stages of digital growth for cable operators: 1) analog distribution, 2) beginning digital transition, 3) digitization impacting business, 4) near 100% digital distribution. It recommends tasks to ensure security at each stage, including system assessments, security policies, and potentially outsourcing security management. The key message is for cable operators to address security proactively from the start of digital transition to protect brands and build customer trust.
Data Mining in Telecommunication Industryijsrd.com
Telecommunication companies today are operating in highly competitive and challenging environment. Vast volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The goal of this paper is to provide a broad review of data mining concepts.
The document discusses how communication service providers can leverage big data analytics to improve customer satisfaction and extract business value. It recommends implementing an Analytics Big Data Repository to provide automated insight into customer usage and performance in real-time. This would allow customizing marketing campaigns and offers for each customer based on their real-time usage patterns and behaviors. It would also enable real-time network optimization and customer experience management through issues detection and resolution. The repository is presented as a solution to data replication challenges that can support multiple use cases and analytical systems simultaneously.
Data mining in telecommunication industryharshu966
The document discusses how data mining techniques are widely used in the telecommunications industry. Some key points:
1) Telecom companies generate huge amounts of data from operational systems that can be used to solve business problems. Data mining and business intelligence are applied to call detail records, network data, and customer information.
2) Applications include fraud detection by comparing customer calling patterns to profiles, and marketing/customer profiling by segmenting large customer databases.
3) Network fault isolation automatically analyzes alarm messages to identify issues.
4) Common techniques include k-means clustering, which groups customer data into classes based on similarity to identify patterns and segment customers for targeted campaigns. Call detail records can be clustered to analyze
Small to midsize businesses face complex decisions when adopting wireless technologies due to many competing options. Research shows that over 69% of leading SMBs use mobile broadband such as aircards and smartphones, with over 82% planning to within 3 years. WiFi networks are also popular, with 46% of SMBs currently using or planning to within 3 years. The document recommends SMBs educate themselves on available technologies, carriers' plans, and how competitors leverage technology.
Curso: Redes y comunicaciones II: 02 CaaS, NaaS.
Dictado en la Universidad Tecnológica del Perú, Lima - Perú, ciclos 2011-3 (octubre/2011) y 2012-1 (abril/2012).
Data Mining in telecommunication industrypragya ratan
Telecommunication companies generate huge volumes of data from their operational systems. They use data mining methods and business intelligence technology to handle business problems by analyzing call detail, customer, and network data. The main applications of data mining in telecommunications include fraud detection, network fault isolation, and improving market effectiveness. Data mining helps telecom companies detect fraud, gain customer insights, retain customers, determine profitable products and services, and identify factors influencing customer call patterns.
Today the telco industry is at the vortex of change due to developments such as network functions virtualization and big data analytics. By allying with IT to embrace and transcend the disruptions characterized by these developments, telecom providers stand to benefit from reduced costs and new revenue streams, and see their profits grow.
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
Prevention is the cornerstone of a resilient network defense strategy. SecurityGen empowers you to take a proactive stance against potential incidents, fortifying your network against future threats. This segment outlines the proactive defense mechanisms offered by SecurityGen, highlighting how these measures can bolster your network's security posture and provide peace of mind in an ever-evolving digital landscape.
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
The digital age has redefined the way we communicate, relying on a complex network of telecommunications infrastructure to bridge distances and connect individuals, organizations, and nations. However, as the reliance on these interconnected systems grows, so does the potential for cyber threats to disrupt these vital connections. "Telecom Cybersecurity" takes center stage as the safeguarding force that strengthens the resilience of these networks against cyberattacks and breaches
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
Telecommunications networks face increasing security threats as they converge with IT technologies and rely more on virtualization and third party suppliers. This exposes sensitive subscriber data and critical network functions to risk. Regulators have established guidelines for telecom supply chain security, but recent breaches show these risks are not always adequately addressed. MNOs must implement stringent security for new services like 5G roaming to properly inspect, protect, and detect threats across complex interconnections between networks.
About SIGFOX
SIGFOX is the first and only operator of a cellular network fully dedicated to low throughput communication for connected objects. Leveraging on its patented UNB technology SIGFOX brings a revolution to the M2M and Internet of Things world by enabling large-scale connection of objects. The network already connects tens of thousands of objects in France and international cities.
SIGFOX provides an end-to-end solution for your communication chain, from your objects through to your information system, with unprecedented pricing models and low energy consumption.
As a network operator SIGFOX operates fixed-location
transceivers enabling your objects to be connected “out of the box”. However contrary to the telecommunication networks, the SIGFOX transceivers and the entire SIGFOX connectivity solution has been developed, built and deployed to only serve the low throughput M2M and IoT applications. As an operated longrange network, SIGFOX provides connectivity without the need to deploy specific network infrastructures for each application.
Unlike other narrow band or white space solution providers we do not require our customers to invest in network equipment, the SIGFOX network is simply available to any object equipped with our certified connectivity solutions.
From an application point of view, the SIGFOX connectivity solution functions as follows:
• SIGFOX compatible modems are integrated within the physical objects by our certified partner network
• The objects instruct the modems to send messages whenever and wherever needed
• The transmitted data is picked up by the SIGFOX transceivers, and routed to our managed service
• The SIGFOX servers verify the data integrity and route the messages to the application’s IT system.
(...)
Sample use cases.
MAAF Assurances, one of the leading French insurance companies, anticipate the upcoming regulation that will impose by 2015 that each household be equipped with a smoke detector. The fire and/or intrusion alert service that will be using the SIGFOX network will enable MAAF insured customers to be warned directly through SMS, in case the intrusion or smoke detectors send alarms and allow MAAF and their customers to be alerted if there is an anomaly, such as low battery, with the
smoke detector.
Clear Channel Outdooroperates stations throughout France. In order to avoid constant manual inspection of the ad stations, a remote monitoring application has been deployed and the SIGFOX network is used to communicate status information from each ad station to the IT system.
For further info:
• contact@sigfox.com
• www.sigfox.com
A survey study of title security and privacy in mobile systemsKavita Rastogi
This document summarizes security and privacy issues related to mobile systems. It discusses how mobile systems originally focused on securing phone calls but now must address additional challenges due to lost/stolen devices and user expectations of flexibility. The document then examines authentication techniques, security across different network domains, and technologies like encryption, digital rights management, and trusted computing platforms that aim to enhance mobile security. It concludes that secure information transmission will become increasingly important as mobile technologies continue advancing.
Cellular Core Enterprise White Paper by Rethink Technology ResearchAndy Odgers
Enterprises of all sizes are facing unprecedented volume and complexity of both data and communications traffic, and the challenges only increase when those two converge. Quortus is taking a pioneering role in the trend to offload enterprise mobile traffic to the edge of the network where it can support the highest quality and business value. This white paper was produced for Quortus by Caroline Gabriel, Research Director at Rethink Technology Research.
This document discusses how telecom companies face challenges in capitalizing on opportunities from the evolution to 3G networks, which will generate much more data. It outlines these challenges as: a dramatic increase in data volume that could overwhelm companies; the need for usage-based billing for new value-added services; meeting customer standards for quality of service; requiring real-time access and processing of customer data; and integration issues with legacy systems. The document proposes that mediation systems, which capture data from multiple sources and route it to various applications, can help companies overcome these challenges by providing a centralized way to integrate diverse data sources and utilize customer information to boost revenue and competitiveness.
A 2004 report I wrote for a global handset manufacturer on how to survive in an over-the-top world. Whilst I didn't get everything right, and I would present it differently today, it was pretty insightful for its time.
The document discusses Samsung's "The Next Big" advertising campaign which openly challenges Apple and portrays Samsung products as superior. The ads publicize the ongoing patent dispute between the two companies while dismantling Apple products. For consumers who have no brand allegiance, the ads provide reasons why Samsung products may be a better choice. However, the campaign risks further escalating tensions between the companies.
This document discusses an approach for seamless real-time and batch processing of telecom transaction records. The approach allows telecom service providers to transition from offline batch processing of stored data to real-time analysis of streaming data. The approach is demonstrated through implementing a telecom revenue assurance solution using IBM Infosphere Streams, which can process stored call detail records (CDRs) offline and analyze streaming CDR data in real-time. This dual mode processing approach could benefit other domains like utilities, banking that deal with high volumes of transaction records.
Software Quality Assurance in the Telecom Industry - Whitepaper - HeadSpin.pdfMatthew Allen
Telecom operators are a vital source of communication facilitators across the world. Telecoms must include cutting-edge technologies and platforms to ensure that end-users receive
seamless service and outstanding customer experience. However, telecommunications are
now struggling to deliver an exceptional customer experience via their mobile and web applications and self-service platforms
2. Data Mining in the Telecommunications Industry
line) level but the raw data represents individual phone was MCI’s Friends and Family program. This program,
calls. Thus it is often necessary to aggregate data to long since retired, began after marketing researchers D
the appropriate semantic level (Sasisekharan, Seshadri identified many small but well connected subgraphs
& Weiss, 1996) before mining the data. An alternative in the graphs of calling activity (Han, Altman, Kumar,
is to utilize a data mining method that can operate on Mannila & Pregibon, 2002). By offering reduced rates
the transactional data directly and extract sequential or to customers in one’s calling circle, this marketing strat-
temporal patterns (Klemettinen, Mannila & Toivonen, egy enabled the company to use their own customers
1999; Weiss & Hirsh, 1998). as salesmen. This work can be considered an early use
Another issue arises because much of the telecom- of social-network analysis and link mining (Getoor &
munications data is generated in real-time and many Diehl, 2005). A more recent example uses the interac-
telecommunication applications, such as fraud identi- tions between consumers to identify those customers
fication and network fault detection, need to operate in likely to adopt new telecommunication services (Hill,
real-time. Because of its efforts to address this issue, Provost & Volinsky, 2006). A more traditional approach
the telecommunications industry has been a leader in involves generating customer profiles (i.e., signatures)
the research area of mining data streams (Aggarwal, from call detail records and then mining these profiles
2007). One way to handle data streams is to maintain a for marketing purposes. This approach has been used
signature of the data, which is a summary description of to identify whether a phone line is being used for voice
the data that can be updated quickly and incrementally. or fax (Kaplan, Strauss & Szegedy, 1999) and to clas-
Cortes and Pregibon (2001) developed signature-based sify a phone line as belonging to a either business or
methods and applied them to data streams of call detail residential customer (Cortes & Pregibon, 1998).
records. A final issue with telecommunication data Over the past few years, the emphasis of marketing
and the associated applications involves rarity. For applications in the telecommunications industry has
example, both telecommunication fraud and network shifted from identifying new customers to measuring
equipment failures are relatively rare. Predicting and customer value and then taking steps to retain the most
identifying rare events has been shown to be quite dif- profitable customers. This shift has occurred because it
ficult for many data mining algorithms (Weiss, 2004) is much more expensive to acquire new telecommunica-
and therefore this issue must be handled carefully in tion customers than retain existing ones. Thus it is useful
order to ensure reasonably good results. to know the total lifetime value of a customer, which
is the total net income a company can expect from that
customer over time. A variety of data mining methods
MAIN FOCUS are being used to model customer lifetime value for
telecommunication customers (Rosset, Neumann, Eick
Numerous data mining applications have been de- & Vatnik, 2003; Freeman & Melli, 2006).
ployed in the telecommunications industry. However, A key component of modeling a telecommunica-
most applications fall into one of the following three tion customer’s value is estimating how long they
categories: marketing, fraud detection, and network will remain with their current carrier. This problem
fault isolation and prediction. is of interest in its own right since if a company can
predict when a customer is likely to leave, it can take
Telecommunications Marketing proactive steps to retain the customer. The process of
a customer leaving a company is referred to as churn,
Telecommunication companies maintain an enormous and churn analysis involves building a model of
amount of information about their customers and, due customer attrition. Customer churn is a huge issue in
to an extremely competitive environment, have great the telecommunication industry where, until recently,
motivation for exploiting this information. For these telecommunication companies routinely offered large
reasons the telecommunications industry has been a cash incentives for customers to switch carriers. Nu-
leader in the use of data mining to identify customers, merous systems and methods have been developed to
retain customers, and maximize the profit obtained from predict customer churn (Wei & Chin, 2002; Mozer,
each customer. Perhaps the most famous use of data Wolniewicz, Grimes, Johnson, & Kaushansky, 2000;
mining to acquire new telecommunications customers Mani, Drew, Betz & Datta, 1999; Masand, Datta, Mani,
487
3. Data Mining in the Telecommunications Industry
& Li, 1999). These systems almost always utilize call was augmented by comparing the new calling be-
detail and contract data, but also often use other data havior to profiles of generic fraud—and fraud is only
about the customer (credit score, complaint history, signaled if the behavior matches one of these profiles.
etc.) in order to improve performance. Churn predic- Customer level data can also aid in identifying fraud.
tion is fundamentally a very difficult problem and, For example, price plan and credit rating information
consequently, systems for predicting churn have been can be incorporated into the fraud analysis (Rosset,
only moderately effective—only demonstrating the Murad, Neumann, Idan, & Pinkas, 1999). More recent
ability to identify some of the customers most likely work using signatures has employed dynamic clustering
to churn (Masand et al., 1999). as well as deviation detection to detect fraud (Alves
et al., 2006). In this work, each signature was placed
Telecommunications Fraud Detection within a cluster and a change in cluster membership
was viewed as a potential indicator of fraud.
Fraud is very serious problem for telecommunica- There are some methods for identifying fraud that
tion companies, resulting in billions of dollars of lost do not involve comparing new behavior against a
revenue each year. Fraud can be divided into two profile of old behavior. Perpetrators of fraud rarely
categories: subscription fraud and superimposition work alone. For example, perpetrators of fraud often
fraud (Fawcett and Provost, 2002). Subscription fraud act as brokers and sell illicit service to others—and the
occurs when a customer opens an account with the illegal buyers will often use different accounts to call
intention of never paying the account and superim- the same phone number again and again. Cortes and
position fraud occurs when a perpetrator gains illicit Pregibon (2001) exploited this behavior by recognizing
access to the account of a legitimate customer. In this that certain phone numbers are repeatedly called from
latter case, the fraudulent behavior will often occur compromised accounts and that calls to these numbers
in parallel with legitimate customer behavior (i.e., is are a strong indicator that the current account may
superimposed on it). Superimposition fraud has been be compromised. A final method for detecting fraud
a much more significant problem for telecommunica- exploits human pattern recognition skills. Cox, Eick
tion companies than subscription fraud. Ideally, both & Wills (1997) built a suite of tools for visualizing
subscription fraud and superimposition fraud should data that was tailored to show calling activity in such
be detected immediately and the associated customer a way that unusual patterns are easily detected by us-
account deactivated or suspended. However, because it ers. These tools were then used to identify international
is often difficult to distinguish between legitimate and calling fraud.
illicit use with limited data, it is not always feasible
to detect fraud as soon as it begins. This problem is Telecommunication Network Fault
compounded by the fact that there are substantial costs Isolation and Prediction
associated with investigating fraud, as well as costs if
usage is mistakenly classified as fraudulent (e.g., an Monitoring and maintaining telecommunication net-
annoyed customer). works is an important task. As these networks became
The most common technique for identifying super- increasingly complex, expert systems were developed
imposition fraud is to compare the customer’s current to handle the alarms generated by the network elements
calling behavior with a profile of his past usage, using (Weiss, Ros & Singhal, 1998). However, because these
deviation detection and anomaly detection techniques. systems are expensive to develop and keep current, data
The profile must be able to be quickly updated because mining applications have been developed to identify
of the volume of call detail records and the need to and predict network faults. Fault identification can be
identify fraud in a timely manner. Cortes and Pregi- quite difficult because a single fault may result in a
bon (2001) generated a signature from a data stream cascade of alarms—many of which are not associated
of call-detail records to concisely describe the calling with the root cause of the problem. Thus an important
behavior of customers and then they used anomaly part of fault identification is alarm correlation, which
detection to “measure the unusualness of a new call enables multiple alarms to be recognized as being
relative to a particular account.” Because new behavior related to a single fault.
does not necessarily imply fraud, this basic approach
488
4. Data Mining in the Telecommunications Industry
The Telecommunication Alarm Sequence Analyzer the telecommunications industry, but as telecommuni-
(TASA) is a data mining tool that aids with fault iden- cation companies start providing television service to D
tification by looking for frequently occurring temporal the home and more sophisticated cell phone services
patterns of alarms (Klemettinen, Mannila & Toivonen, become available (e.g., music, video, etc.), it is clear
1999). Patterns detected by this tool were then used to that new data mining applications, such as recommender
help construct a rule-based alarm correlation system. systems, will be developed and deployed.
Another effort, used to predict telecommunication Unfortunately, there is also one troubling trend that
switch failures, employed a genetic algorithm to mine has developed in recent years. This concerns the in-
historical alarm logs looking for predictive sequential creasing belief that U.S. telecommunication companies
and temporal patterns (Weiss & Hirsh, 1998). One are too readily sharing customer records with govern-
limitation with the approaches just described is that mental agencies. This concern arose in 2006 due to
they ignore the structural information about the under- revelations—made public in numerous newspaper and
lying network. The quality of the mined sequences can magazine articles—that telecommunications companies
be improved if topological proximity constraints are were turning over information on calling patterns to
considered in the data mining process (Devitt, Duffin the National Security Agency (NSA) for purposes of
and Moloney, 2005) or if substructures in the telecom- data mining (Krikke, 2006). If this concern continues to
munication data can be identified and exploited to allow grow unchecked, it could lead to restrictions that limit
simpler, more useful, patterns to be learned (Baritchi, the use of data mining for legitimate purposes.
Cook, & Lawrence, 2000). Another approach is to use
Bayesian Belief Networks to identify faults, since they
can reason about causes and effects (Sterritt, Adamson, CONCLUSION
Shapcott & Curran, 2000).
The telecommunications industry has been one of the
early adopters of data mining and has deployed numer-
FUTURE TRENDS ous data mining applications. The primary applications
relate to marketing, fraud detection, and network
Data mining should play an important and increasing monitoring. Data mining in the telecommunications
role in the telecommunications industry due to the industry faces several challenges, due to the size of
large amounts of high quality data available, the com- the data sets, the sequential and temporal nature of the
petitive nature of the industry and the advances being data, and the real-time requirements of many of the
made in data mining. In particular, advances in mining applications. New methods have been developed and
data streams, mining sequential and temporal data, existing methods have been enhanced to respond to
and predicting/classifying rare events should benefit these challenges. The competitive and changing nature
the telecommunications industry. As these and other of the industry, combined with the fact that the industry
advances are made, more reliance will be placed on the generates enormous amounts of data, ensures that data
knowledge acquired through data mining and less on the mining will play an important role in the future of the
knowledge acquired through the time-intensive process telecommunications industry.
of eliciting domain knowledge from experts—although
we expect human experts will continue to play an
important role for some time to come. REFERENCES
Changes in the nature of the telecommunications
industry will also lead to the development of new ap- Aggarwal, C. (Ed.). (2007). Data Streams: Models and
plications and the demise of some current applications. Algorithms. New York: Springer.
As an example, the main application of fraud detection
in the telecommunications industry used to be in cellular Alves, R., Ferreira, P., Belo, O., Lopes, J., Ribeiro, J.,
cloning fraud, but this is no longer the case because the Cortesao, L., & Martins, F. (2006). Discovering telecom
problem has been largely eliminated due to technologi- fraud situations through mining anomalous behavior
cal advances in the cell phone authentication process. patterns. Proceedings of the ACM SIGKDD Workshop
It is difficult to predict what future changes will face on Data Mining for Business Applications (pp. 1-7).
New York: ACM Press.
489
5. Data Mining in the Telecommunications Industry
Baritchi, A., Cook, D., & Holder, L. (2000). Discov- Liebowitz, J. (1988). Expert System Applications to
ering structural patterns in telecommunications data. Telecommunications. New York, NY: John Wiley &
Proceedings of the Thirteenth Annual Florida AI Re- Sons.
search Symposium (pp. 82-85).
Mani, D., Drew, J., Betz, A., & Datta, P (1999). Statistics
Cortes, C., & Pregibon, D (1998). Giga-mining. Pro- and data mining techniques for lifetime value modeling.
ceedings of the Fourth International Conference on Proceedings of the Fifth ACM SIGKDD International
Knowledge Discovery and Data Mining (pp. 174-178). Conference on Knowledge Discovery and Data Mining
New York, NY: AAAI Press. (pp. 94-103). New York, NY: ACM Press.
Cortes, C., & Pregibon, D. (2001). Signature-based Masand, B., Datta, P., Mani, D., & Li, B. (1999).
methods for data streams. Data Mining and Knowledge CHAMP: A prototype for automated cellular churn
Discovery, 5(3), 167-182. prediction. Data Mining and Knowledge Discovery,
3(2), 219-225.
Cox, K., Eick, S., & Wills, G. (1997). Visual data min-
ing: Recognizing telephone calling fraud. Data Mining Mozer, M., Wolniewicz, R., Grimes, D., Johnson, E.,
and Knowledge Discovery, 1(2), 225-231. & Kaushansky, H. (2000). Predicting subscriber dis-
satisfaction and improving retention in the wireless
Devitt, A., Duffin, J., & Moloney, R. (2005). Topo-
telecommunication industry. IEEE Transactions on
graphical proximity for mining network alarm data.
Neural Networks, 11, 690-696.
Proceedings of the 2005 ACM SIGCOMM Workshop
on Mining Network Data (pp. 179-184). New York: Rosset, S., Murad, U., Neumann, E., Idan, Y., & Gadi,
ACM Press. P. (1999). Discovery of fraud rules for telecommu-
nications—challenges and solutions. Proceedings of
Fawcett, T., & Provost, F. (2002). Fraud Detection. In
the Fifth ACM SIGKDD International Conference on
W. Klosgen & J. Zytkow (Eds.), Handbook of Data
Knowledge Discovery and Data Mining (pp. 409-413).
Mining and Knowledge Discovery (pp. 726-731). New
New York: ACM Press.
York: Oxford University Press.
Rosset, S., Neumann, E., Eick, U., & Vatnik (2003).
Freeman, E., & Melli, G. (2006). Championing of
Customer lifetime value models for decision support.
an LTV model at LTC. SIGKDD Explorations, 8(1),
Data Mining and Knowledge Discovery, 7(3), 321-
27-32.
339.
Getoor, L., & Diehl, C.P. (2005). Link mining: A survey.
Sasisekharan, R., Seshadri, V., & Weiss, S (1996). Data
SIGKDD Explorations, 7(2), 3-12.
mining and forecasting in large-scale telecommunica-
Hill, S., Provost, F., & Volinsky, C. (2006). Network- tion networks. IEEE Expert, 11(1), 37-43.
based marketing: Identifying likely adopters via con-
Sterritt, R., Adamson, K., Shapcott, C., & Curran, E.
sumer networks. Statistical Science, 21(2), 256-276.
(2000). Parallel data mining of Bayesian networks from
Kaplan, H., Strauss, M., & Szegedy, M. (1999). Just telecommunication network data. Proceedings of the
the fax—differentiating voice and fax phone lines us- 14th International Parallel and Distributed Processing
ing call billing data. Proceedings of the Tenth Annual Symposium, IEEE Computer Society.
ACM-SIAM Symposium on Discrete Algorithms (pp.
Wei, C., & Chiu, I (2002). Turning telecommunications
935-936). Philadelphia, PA: Society for Industrial and
call details to churn prediction: A data mining approach.
Applied Mathematics.
Expert Systems with Applications, 23(2), 103-112.
Klemettinen, M., Mannila, H., & Toivonen, H. (1999).
Weiss, G., & Hirsh, H (1998). Learning to predict rare
Rule discovery in telecommunication alarm data.
events in event sequences. In R. Agrawal & P. Stolorz
Journal of Network and Systems Management, 7(4),
(Eds.), Proceedings of the Fourth International Confer-
395-423.
ence on Knowledge Discovery and Data Mining (pp.
Krikke, J. (2006). Intelligent surveillance empowers 359-363). Menlo Park, CA: AAAI Press.
security analysts. IEEE Intelligent Systems, 21(3),
102-104.
490
6. Data Mining in the Telecommunications Industry
Weiss, G., Ros, J., & Singhal, A. (1998). ANSWER: Call Detail Record: Contains the descriptive in-
Network monitoring using object-oriented rule. Pro- formation associated with a single phone call. D
ceedings of the Tenth Conference on Innovative Ap-
Churn: Customer attrition. Churn prediction refers
plications of Artificial Intelligence (pp. 1087-1093).
to the ability to predict that a customer will leave a
Menlo Park: AAAI Press.
company before the change actually occurs.
Weiss, G. (2004). Mining with rarity: A unifying frame-
Signature: A summary description of a subset of
work. SIGKDD Explorations, 6(1), 7-19.
data from a data stream that can be updated incremen-
Winter Corporation (2003). 2003 Top 10 Award Win- tally and quickly.
ners. Retrieved October 8, 2005, from http://www.
Subscription Fraud: Occurs when a perpetrator
wintercorp.com/VLDB/2003_TopTen_Survey/Top-
opens an account with no intention of ever paying for
Tenwinners.asp
the services incurred.
Superimposition Fraud: Occurs when a perpetra-
tor gains illicit access to an account being used by a
KEY TERMS legitimate customer and where fraudulent use is “su-
perimposed” on top of legitimate use.
Bayesian Belief Network: A model that predicts
the probability of events or conditions based on causal Total Lifetime Value: The total net income a com-
relations. pany can expect from a customer over time.
491