Philippe Langlois - LTE Pwnage - P1securityP1Security
Today, we’re entering the realm of LTE super high speed always-on connectivity and with that comes the victory of TCP/IP in front of the old ITU/3GPP protocols. And with this comes many side effects: software gets standardized, everything runs on top of ATCA (Advanced Telecom Computing Architecture) hardware running mostly Linux -give or take 6 or 8 proprietary FPGA-based sister cards, TFTP-booted with decade old VxWorks that routinely show hardcoded DES credentials and funny “behaviour”. Easily 20 GB of fat C++ binaries, some for x86, PPC, MIPS, some with up to 200 Mbytes file sizes for one single EXE! It’s called a vulnerability research and reverse engineering paradise… or hell.
All the protocols now run on top of IP, which ends up having 12 layers thanks to encapsulation and still the weight of legacy in bugs quantity and diversity. We’ll see how the porting of SS7 MAP on top of IP (SIGTRAN, Diameter) has given rise to funny Denial of Service (DoS) attacks against telecom core elements (DSR, STP), with trashy-crashy anti-forensics consequences for DPI and tracking (Hey @grugq!!).
We’ll look into specific vulnerabilities, and talk about the very particular way that Network Equipment Vendors deal with security in the telecom domain.
We will demo a virtualized Huawei HSS from our testbed and show some of the vulnerabilities and attacks directly on the equipment itself. We will finally talk about telco equipment and product security reviews and the fallacy of (some) certification and (many) standardization attempts. We will then see how to conduct a practical and fast telecom product security life cycle with automation and open source tools.
IMS est une architecture de réseau conçue pour fournir des services IP multimédia fixes et mobiles. Il constitue le cœur des NGN (Next Generation Networks)...
Mohan R has over 4 years of experience in telecom testing. He has expertise in testing technologies like LTE, VoIP, IMS and UMTS networks and protocols including NAS, S1AP, GTP, SIP and RTP. Currently he works as a senior system test engineer at Mavenir Systems where he is involved in testing the MME functionality through developing and executing test cases. Previously he worked on testing the AT&T VoLTE network through validating the SGW-PGW interface and features like dedicated bearer, default bearer and handovers. He is proficient with test tools like EAST, IXIA, HPQC, Wireshark and scripting languages.
The document provides information on 2G/3G network architectures. It discusses 2G GSM network architecture including components like the BTS, BSC, MSC, VLR, HLR and interfaces like A, Abis, and GSM. It then covers GPRS and EDGE network enhancements, components like the SGSN, GGSN, and interfaces like Gn and Gi. Finally, it discusses UMTS network technologies like W-CDMA and HSDPA that improved data rates.
This document provides an overview of the key principles and components of a GSM network, including:
- The mobile station consists of the mobile equipment and subscriber identity module.
- The base station subsystem comprises the base transceiver station, which provides radio access, and the base station controller, which manages radio resources.
- The network switching subsystem includes the mobile switching center, home location register, visitor location register, and equipment identity register.
- The network uses several interfaces to connect the different components and allow mobility across the network.
This document provides an overview of GSM Subscriber Identity Module (SIM) cards, including:
1. The SIM card has evolved over time, shrinking from its original 1FF size to the current nano SIM size of 4FF.
2. The SIM holds information to identify a mobile subscription and acts as the "key" for the subscriber to access the mobile network.
3. The SIM contains components like a CPU, ROM, RAM and EEPROM that allow it to perform functions like access control, customization, service personalization and more.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
Philippe Langlois - LTE Pwnage - P1securityP1Security
Today, we’re entering the realm of LTE super high speed always-on connectivity and with that comes the victory of TCP/IP in front of the old ITU/3GPP protocols. And with this comes many side effects: software gets standardized, everything runs on top of ATCA (Advanced Telecom Computing Architecture) hardware running mostly Linux -give or take 6 or 8 proprietary FPGA-based sister cards, TFTP-booted with decade old VxWorks that routinely show hardcoded DES credentials and funny “behaviour”. Easily 20 GB of fat C++ binaries, some for x86, PPC, MIPS, some with up to 200 Mbytes file sizes for one single EXE! It’s called a vulnerability research and reverse engineering paradise… or hell.
All the protocols now run on top of IP, which ends up having 12 layers thanks to encapsulation and still the weight of legacy in bugs quantity and diversity. We’ll see how the porting of SS7 MAP on top of IP (SIGTRAN, Diameter) has given rise to funny Denial of Service (DoS) attacks against telecom core elements (DSR, STP), with trashy-crashy anti-forensics consequences for DPI and tracking (Hey @grugq!!).
We’ll look into specific vulnerabilities, and talk about the very particular way that Network Equipment Vendors deal with security in the telecom domain.
We will demo a virtualized Huawei HSS from our testbed and show some of the vulnerabilities and attacks directly on the equipment itself. We will finally talk about telco equipment and product security reviews and the fallacy of (some) certification and (many) standardization attempts. We will then see how to conduct a practical and fast telecom product security life cycle with automation and open source tools.
IMS est une architecture de réseau conçue pour fournir des services IP multimédia fixes et mobiles. Il constitue le cœur des NGN (Next Generation Networks)...
Mohan R has over 4 years of experience in telecom testing. He has expertise in testing technologies like LTE, VoIP, IMS and UMTS networks and protocols including NAS, S1AP, GTP, SIP and RTP. Currently he works as a senior system test engineer at Mavenir Systems where he is involved in testing the MME functionality through developing and executing test cases. Previously he worked on testing the AT&T VoLTE network through validating the SGW-PGW interface and features like dedicated bearer, default bearer and handovers. He is proficient with test tools like EAST, IXIA, HPQC, Wireshark and scripting languages.
The document provides information on 2G/3G network architectures. It discusses 2G GSM network architecture including components like the BTS, BSC, MSC, VLR, HLR and interfaces like A, Abis, and GSM. It then covers GPRS and EDGE network enhancements, components like the SGSN, GGSN, and interfaces like Gn and Gi. Finally, it discusses UMTS network technologies like W-CDMA and HSDPA that improved data rates.
This document provides an overview of the key principles and components of a GSM network, including:
- The mobile station consists of the mobile equipment and subscriber identity module.
- The base station subsystem comprises the base transceiver station, which provides radio access, and the base station controller, which manages radio resources.
- The network switching subsystem includes the mobile switching center, home location register, visitor location register, and equipment identity register.
- The network uses several interfaces to connect the different components and allow mobility across the network.
This document provides an overview of GSM Subscriber Identity Module (SIM) cards, including:
1. The SIM card has evolved over time, shrinking from its original 1FF size to the current nano SIM size of 4FF.
2. The SIM holds information to identify a mobile subscription and acts as the "key" for the subscriber to access the mobile network.
3. The SIM contains components like a CPU, ROM, RAM and EEPROM that allow it to perform functions like access control, customization, service personalization and more.
Presented by Tobias Engel <tobias@ccc.de>
Available to download from: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
Shared with permission
An introduction to 5G technology through the evolution of mobile networks: from 1G to 5G. The presentation provides basic information about each generation of mobile network: features, limitations, basic radio technologies and algorithms behind each generation.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
Roaming remains hugely important to mobile operators, with Informa forecasting that revenues from roaming services will reach $28.3bn worldwide in 2016. This webinar reveals the industry views on the future of roaming from a survey carried out by Informa/Telecoms.com Intelligence and answered by 600 operators.
Lessons Learned: Implementing VoLTE Roaming APAC Syniverse
Syniverse (@Syniverse) explores what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
Telecom fraud is booming at an alarming rate worldwide to become a major source of revenue loss for mobile operators. According to the CFSA, mobile operators lost $28 billion to fraud in 2019. SIM swapping has again become a hot-button topic in the telecom industry. This worrying trend is provoking disputes between banks and telecoms and causing harm all around.
Our security experts Sergey Puzankov and Milan Březina show how to perform and protect from different attacks in the telecom world, including:
- SIM swapping
- A2P SMS termination with security bypass
- OTP SMS interception
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
This document provides an overview of the IP Multimedia Subsystem (IMS) standards and architecture. It discusses the evolution from 2G to 3G/4G mobile networks and the integration of IMS. The key components of IMS are described including the Call Session Control Function (CSCF), Home Subscriber Server (HSS), Application Servers (AS), Media Resource Functions (MRF), and Breakout Gateway Control Function (BGCF). Registration and call flow examples are provided to illustrate IMS signaling. Approaches to migrating existing networks to IMS are also summarized.
This document provides an overview of Voice over WiFi (VoWifi) including the key nodes involved and their roles. It discusses the user equipment (UE), evolved Packet Data Gateway (ePDG), AAA server, PGW, HSS, IMS, and PCRF nodes. The UE establishes an IPsec tunnel with the ePDG to access the EPC over an untrusted WiFi network. The ePDG and AAA server perform authentication. The existing PGW, HSS, IMS, and PCRF nodes are reused to support VoWifi calls and handovers between VoLTE and VoWifi. Key performance indicators for each node are also measured to ensure quality of VoWifi user experience
Aide à la Planification Cellulaire dans un Réseau LTE (4G)Fatiha Merazka
Les réseaux de télécommunications ont pris de plus en plus d'importance dans notre vie quotidienne. Pour satisfaire au mieux les besoins et les intérêts des clients, les opérateurs doivent pouvoir offrir, au meilleur prix, des services d'excellente qualité. C'est dans ce cadre que s'inscrit le problème de planification cellulaire des réseaux qui consiste à optimiser les coûts engendréspar l'installation et l'utilisation du système. Une planification bien effectuée a pour effet de réduire le temps de mise en marche, le coût des dépenses d'investissement ainsi que le coût des dépenses opérationnelles.
Le réseau mobile est aujourd'hui un domaine en pleine effervescence. Pendant la dernière décennie, les évolutions de télécommunications ont explosé une nouvelle gamme de service qui a écarté les services classiques afin de satisfaire l’augmentation du nombre des utilisateurs et les exigences de taux de données élevés.
Cette motivation laisse les générations mobiles se succéder et se développer, de la technologie GSM vers un système de paquets tout IP optimisé dénommé Long Term Evolution (LTE).
L’opérateur se trouve, devant ces technologies, obligé de répondre à la croissance continue du trafic, avec une faible latence, une meilleure fiabilité, et une meilleure efficacité spectrale par rapport aux précédentes générations. Ces exigences ont stimulé les évolutions des réseaux pour mettre aujourd’hui le premier pas vers la quatrième génération avec LTE.
A ce stade, l’opérateur doit réduire le coût d’investissement et augmenter la qualité de service pour assurer la rentabilité.
Pour le faire il doit passer par les phases primordiales : dimensionnement et planification de système radio mobile, qui consiste à déterminer l'ensemble des composantes matérielles et logicielles de ces systèmes, les positionner, les interconnecter et les utiliser de façon optimale, en respectant, entre autres, une série de contraintes de qualité de service.
De façon générale, le problème de planification fait intervenir plusieurs sous-problèmes avec chacun un niveau de complexité différent. Dans ce travail, le sous-problème qui est traité concerne l'affectation des cellules aux commutateurs. Ce problème consiste à déterminer un modèle d'affectation qui permet de minimiser le coût d'investissement des équipements du réseau 4G, tout en maximisant l'utilisation faite des équipements du réseau 3G déjà en place.
Ainsi, la solution proposée est un modèle qui décrit la marche à suivre lors de la planification initiale d’un réseau LTE qui se base sur la planification et le dimensionnement des zones de suivi ou Tracking Area.
Dans ce projet, nous allons donc effectuer une planification et un dimensionnement des zones Tracking Area.
This document discusses different methods for providing voice services over 4G networks, including Circuit Switched Fallback (CSFB) where voice calls fall back to 2G/3G, VoIP over LTE (VoLTE) where voice is carried independently over a separate bearer, and Single Radio Voice Call Continuity (SRVCC) which allows voice calls to continue on 2G/3G networks when handing over from LTE. It also covers topics like the EPS network architecture and different quality of service classes for EPS bearers.
M3UA is a protocol that allows legacy SS7 networks to be integrated with IP networks. It provides a way to transport SS7 signaling protocols like ISUP, SCCP, and TUP over IP using SCTP. M3UA is commonly deployed as an application server process that acts as a gateway, allowing SS7 networks to interface with IP-based networks. This allows telephony services to take advantage of IP networks while maintaining reliability. M3UA can be configured in a point-to-point or gateway setup.
Introduction to Diameter: The Evolution of SignalingPT
As telecommunications networks have advanced, so have the signaling procedures. This introduction to Diameter gives you an overview of the evolution of signaling.
This document provides a high-level overview of key components in telecom OSS/BSS systems. It discusses general concepts like numbering plans and call scenarios. It then summarizes the main components, including data collection, mediation, billing, SS7 monitoring, revenue assurance, and fulfillment/provisioning. The document provides brief explanations of the purpose and processes within each component.
When two large companies merge, it often takes a while – years in some cases – before processes get redesigned to span all departments, and the new organization settles into a lean and profitable machine. And the same is true of OSS/BSS. These systems have been designed for two different purposes: to keep the network operational and to keep it profitable. But today’s demanding networks need the functions of both of these systems to work together, and to work across the varying lifecycles of products and services.
An introduction to 5G technology through the evolution of mobile networks: from 1G to 5G. The presentation provides basic information about each generation of mobile network: features, limitations, basic radio technologies and algorithms behind each generation.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
Roaming remains hugely important to mobile operators, with Informa forecasting that revenues from roaming services will reach $28.3bn worldwide in 2016. This webinar reveals the industry views on the future of roaming from a survey carried out by Informa/Telecoms.com Intelligence and answered by 600 operators.
Lessons Learned: Implementing VoLTE Roaming APAC Syniverse
Syniverse (@Syniverse) explores what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
Telecom fraud is booming at an alarming rate worldwide to become a major source of revenue loss for mobile operators. According to the CFSA, mobile operators lost $28 billion to fraud in 2019. SIM swapping has again become a hot-button topic in the telecom industry. This worrying trend is provoking disputes between banks and telecoms and causing harm all around.
Our security experts Sergey Puzankov and Milan Březina show how to perform and protect from different attacks in the telecom world, including:
- SIM swapping
- A2P SMS termination with security bypass
- OTP SMS interception
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
This document provides an overview of the IP Multimedia Subsystem (IMS) standards and architecture. It discusses the evolution from 2G to 3G/4G mobile networks and the integration of IMS. The key components of IMS are described including the Call Session Control Function (CSCF), Home Subscriber Server (HSS), Application Servers (AS), Media Resource Functions (MRF), and Breakout Gateway Control Function (BGCF). Registration and call flow examples are provided to illustrate IMS signaling. Approaches to migrating existing networks to IMS are also summarized.
This document provides an overview of Voice over WiFi (VoWifi) including the key nodes involved and their roles. It discusses the user equipment (UE), evolved Packet Data Gateway (ePDG), AAA server, PGW, HSS, IMS, and PCRF nodes. The UE establishes an IPsec tunnel with the ePDG to access the EPC over an untrusted WiFi network. The ePDG and AAA server perform authentication. The existing PGW, HSS, IMS, and PCRF nodes are reused to support VoWifi calls and handovers between VoLTE and VoWifi. Key performance indicators for each node are also measured to ensure quality of VoWifi user experience
Aide à la Planification Cellulaire dans un Réseau LTE (4G)Fatiha Merazka
Les réseaux de télécommunications ont pris de plus en plus d'importance dans notre vie quotidienne. Pour satisfaire au mieux les besoins et les intérêts des clients, les opérateurs doivent pouvoir offrir, au meilleur prix, des services d'excellente qualité. C'est dans ce cadre que s'inscrit le problème de planification cellulaire des réseaux qui consiste à optimiser les coûts engendréspar l'installation et l'utilisation du système. Une planification bien effectuée a pour effet de réduire le temps de mise en marche, le coût des dépenses d'investissement ainsi que le coût des dépenses opérationnelles.
Le réseau mobile est aujourd'hui un domaine en pleine effervescence. Pendant la dernière décennie, les évolutions de télécommunications ont explosé une nouvelle gamme de service qui a écarté les services classiques afin de satisfaire l’augmentation du nombre des utilisateurs et les exigences de taux de données élevés.
Cette motivation laisse les générations mobiles se succéder et se développer, de la technologie GSM vers un système de paquets tout IP optimisé dénommé Long Term Evolution (LTE).
L’opérateur se trouve, devant ces technologies, obligé de répondre à la croissance continue du trafic, avec une faible latence, une meilleure fiabilité, et une meilleure efficacité spectrale par rapport aux précédentes générations. Ces exigences ont stimulé les évolutions des réseaux pour mettre aujourd’hui le premier pas vers la quatrième génération avec LTE.
A ce stade, l’opérateur doit réduire le coût d’investissement et augmenter la qualité de service pour assurer la rentabilité.
Pour le faire il doit passer par les phases primordiales : dimensionnement et planification de système radio mobile, qui consiste à déterminer l'ensemble des composantes matérielles et logicielles de ces systèmes, les positionner, les interconnecter et les utiliser de façon optimale, en respectant, entre autres, une série de contraintes de qualité de service.
De façon générale, le problème de planification fait intervenir plusieurs sous-problèmes avec chacun un niveau de complexité différent. Dans ce travail, le sous-problème qui est traité concerne l'affectation des cellules aux commutateurs. Ce problème consiste à déterminer un modèle d'affectation qui permet de minimiser le coût d'investissement des équipements du réseau 4G, tout en maximisant l'utilisation faite des équipements du réseau 3G déjà en place.
Ainsi, la solution proposée est un modèle qui décrit la marche à suivre lors de la planification initiale d’un réseau LTE qui se base sur la planification et le dimensionnement des zones de suivi ou Tracking Area.
Dans ce projet, nous allons donc effectuer une planification et un dimensionnement des zones Tracking Area.
This document discusses different methods for providing voice services over 4G networks, including Circuit Switched Fallback (CSFB) where voice calls fall back to 2G/3G, VoIP over LTE (VoLTE) where voice is carried independently over a separate bearer, and Single Radio Voice Call Continuity (SRVCC) which allows voice calls to continue on 2G/3G networks when handing over from LTE. It also covers topics like the EPS network architecture and different quality of service classes for EPS bearers.
M3UA is a protocol that allows legacy SS7 networks to be integrated with IP networks. It provides a way to transport SS7 signaling protocols like ISUP, SCCP, and TUP over IP using SCTP. M3UA is commonly deployed as an application server process that acts as a gateway, allowing SS7 networks to interface with IP-based networks. This allows telephony services to take advantage of IP networks while maintaining reliability. M3UA can be configured in a point-to-point or gateway setup.
Introduction to Diameter: The Evolution of SignalingPT
As telecommunications networks have advanced, so have the signaling procedures. This introduction to Diameter gives you an overview of the evolution of signaling.
This document provides a high-level overview of key components in telecom OSS/BSS systems. It discusses general concepts like numbering plans and call scenarios. It then summarizes the main components, including data collection, mediation, billing, SS7 monitoring, revenue assurance, and fulfillment/provisioning. The document provides brief explanations of the purpose and processes within each component.
When two large companies merge, it often takes a while – years in some cases – before processes get redesigned to span all departments, and the new organization settles into a lean and profitable machine. And the same is true of OSS/BSS. These systems have been designed for two different purposes: to keep the network operational and to keep it profitable. But today’s demanding networks need the functions of both of these systems to work together, and to work across the varying lifecycles of products and services.
The document discusses various aspects of telecommunications business support systems (BSS), including the evolution of mobile network generations, the roles of different players in the industry, services provided by telecom operators, challenges faced by operators and customers, and the key components and challenges of billing systems. It covers topics such as mobile payments, content providers, smartphones, operations and business support systems, challenges of billing, discount schemes, and mobile number portability.
The document discusses OSS/BSS testing and AMS from multiple perspectives. It provides an overview of OSS/BSS systems and their modules. It then discusses testing from a business perspective focusing on customer and service lifecycles, and from a technical perspective focusing on frontend and backend systems. It proposes introducing Testing as a Service (TaaS) to provide OSS/BSS testing in a flexible consumption model. It discusses leveraging testing teams and environments to serve business needs and building a testing repository for the telecom industry.
The document discusses next generation OSS/BSS architecture and tools. It describes the Telecom Management Network (TMN) reference model, which provided a standardized architecture for managing telecommunications networks. The TMN model includes functional, physical, informational, and logical layered architectures. It also discusses challenges with legacy OSS/BSS systems and introduces the NGOSS framework as a set of tools and lifecycle developed by the TM Forum to help design and implement next generation management systems, including the eTOM framework for defining business processes and the SID for defining shared information.
The document discusses automating processes for a telecom company. It describes the various activities involved, including pre-sales, ordering, provisioning, billing, and service assurance. It explains that prior to automation, processes took 6-12 months due to manual work, but automation reduced this to less than 3 weeks. Testing is an important part of development and can account for 20-30% of a project's effort. The document outlines best practices for testing telecom software, including forming a dedicated testing team, following a testing workflow process, and using both manual and automated testing methods.
Virtualization and BSS Transformation - Why and HowOpenet
This webinar discusses BSS virtualization, highlighting key benefits such as accelerating service innovation, learning fast and minimizing risks, facilitating new business models, and optimizing costs. Virtualizing BSS solutions allows operators to deploy services faster, scale more easily, and gain flexibility. While protecting legacy investments, virtualization provides the agility needed to capitalize on new opportunities. Case studies demonstrate how Openet has helped operators successfully adopt large-scale virtualized policy systems.
The document describes Comarch's portfolio of BSS/OSS solutions for telecommunications companies. It provides an overview of the key solutions in areas such as sales and customer management, billing, service fulfillment, network management, and analytics. Comarch aims to help telecom companies address the challenges of the digital era and optimize costs while improving customer experience and business efficiency. The portfolio includes solutions for CRM, billing, order management, customer self-service, and more that can be customized to meet individual company needs.
Plus de flexibilité et de scalabilité chez Bouygues Télécom grâce à MongoDBMongoDB
Comme de nombreux opérateur Bouygues télécom dispose d'un annuaire des services de ses clients. Ce système est critique pour réaliser les paiements sur facture des abonnées, s'authentifier sur sa boite de messagerie, regarder la télévision en streaming et bien d'autres services. Il y a quelque années une solution du marché avait été choisie. Après de nombreux problèmes - de performances et de trop grande rigidé du modèle - ce systême a été remplacé par un dévelopement spécifique architecturé autour de MongoDB, Apache Storm et Apache Tomcat. Cette présentation retrace l'histoire de cette refonte et les écueils rencontrés puis surmontés pour mettre en place un système disponible à 99,9% avec des sollicitations pouvant aller jusqu'à 3000 req/s. Nous parlerons de construction de modèle, de devops et aussi de topologie storm.
Le lecteur trouvera dans le premier chapitre une brève description de l’architecture du réseau GSM et de ces composants. Le deuxième chapitre discutera les étapes de planification d’un réseau cellulaire parmi lesquelles on trouve celle du réseau fixe. Le troisième chapitre sera consacré à la description et à la formulation des différentes problématiques qui se posent lors de la planification du réseau fixe. Et avant de se lancer dans le chapitre cinq qui explique les différents modules utilisés dans l’application, le chapitre quatre explique le principe de quelques méthodes heuristiques utilisées pour la résolution des problèmes tel que celui étudié dans ce travail
Les environnements SAS évoluent et se modernisent, ouvrent de nouvelles opportunités d’usages (automatisation des traitements, industrialisation des productions de restitutions avec un outil de dataviz, …), mais imposent de nouveaux modes de travail. Comment en tirer pleinement profit tout en minimisant l’effort de migration ?
Le décisionnel est depuis longtemps en pleine mutation, il faut pour certains penser l’architecture de la BI de demain, pour d’autres l’accent est à mettre sur l’exploitation des gisements de données restées longtemps impossible avant la révolution du Big Data, pour d’autres enfin il convient plutôt d’adapter les usages aux outils qui malgré leurs nouveautés sont aux prises avec l’évolution des pratiques.
Deux tendances semblent toutefois animer la recherche d’ajustement pour les opérationnels :
La modernisation des environnements : allant vers la centralisation des serveurs, ce mouvement semble ne plus laisser de place aux installations de clients lourds sur PC, offrant de plus en plus de mobilité aux utilisateurs (légers, mobiles, etc.) jusqu’à l’affranchissement des applications classiques : SAS BASE est ainsi devenue SAS STUDIO : un client totalement WEB.
Enfin, la dynamique impulsée par le Dataviz affecte de façon significative les usages de la BI à tous les niveaux, poussant même à repenser le schéma classique des catégories de reporting : reporting de masse, reporting opérationnel, reporting prospectif.
Pour cette nouvelle Matinale Technologique Soft Computing, nous vous proposons deux ateliers autour de la thématique de l’impact de l’évolution des outils sur les usages :
Atelier 1 :
- Migration vers SAS Enterprise Guide ou SAS STUDIO : quels impacts sur les usages et les pratiques ?
Atelier 2 :
- SAS Visual Analytics : un outil de reporting orienté Exploration et Analyse ?
Hébergement SaaS ASP - Forum Solutions-as-a-Service du Club Alliances IBM - 2...Club Alliances
Etat du Marché et de l'offre d'hébergement applicatif et de platformes d'hébergement SaaS / ASP. Retour d'expérience par Patrice Lagorsse, Aspaway.
Présentation faite dans le cadre du Forum Solutions-as-a-Service du Club Alliances IBM le 5 juin 2009.
Hébergement SaaS ASP - Forum Solutions-as-a-Service du Club Alliances IBM - 2...
Bss - oss - Ericsson
1. GSM : Global System for Mobile Communication
C’est une norme élaborée au cours des années 80 et 90. La norme GSM est utilisée pour les
réseaux de communication sans fil à travers le monde.
Réseau de téléphone cellulaire analogue
Plusieurs extensions de GSM ont été définies pour augmenter le débit binaire ex. :
- HSCSD High Speed Circuit Switched Data
- GPRS General Packet Radio Service
- EDGE Enhaced Data rates for GSM Evolution
Un réseau GSM compte une (ou plusieures) station de base par cellule.
Architecture GSM : Un réseau GSM compte une ou plusieurs stations de base par cellule. La
station mobile choisie la cellule selon la puissance du signal. Les composants sont :
- Le contrôleur de station de base : BSC - Base Station Controller : gérer les
ressources radio (config canaux, transfert intercellulaire) des BTS, en plus fait le
lien entre BTS et MSC.
- La station de base : BTS - Base Transceiver Station : ens émetteurs-récepteurs et
leur antenne. Souvent une BTS est associé à un cellule et est situé au centre
- Le commutateur de service mobile : MSC - Mobile Switching Center
Système GSM
Dans l’architecture de GSM, on peut diviser le réseau en 4 parties principales :
- La Station Mobile : MS - Mobile Station : carte SIM + Téléphone Mobile
- Le Sous Système Radio : BSS - Base Station Subsystem : BTS + BSC
- Le Sous Système Réseau : NSS - Network Subsystem
- Le Sous Système Opération : OSS - Operation Subsystem
2. Architecture GSM
BSS : (BusinessSupportSystems)- Système de SupportFonctionnel("Métier").
Le terme Business Support System ou BSS est un terme généraliste récent qui fait référence
aux solutions métier, qui traitent avec les clients, le maintien des processus tels que la prise de
commandes, le traitement des factures, et la collecte des paiements. Les deux systèmes sont
souvent abrégés ensemble BSS/OSS ou simplement B/OSS.
Progiciels qui les activités orientées client : Facturation, Gestion de commandes, Gestion de la
relation client CRM, Automatisation de centre d’appel sont toutes des applications BSS
BSS peut également englober la facette des applications OSS orientées client comme la gestion
des incidents et le service d’assurance
La relation basic entre OSS et BSS ou OSS a passé des commandes de services et fourniture
des information de service assurance à la couche BSS
Historiquement, le terme OSS a été utilisé pour inclure à la fois des réseaux et des systèmes
d'entreprise. Il est encore parfois utilisé dans ce sens, ce qui peut provoquer une certaine
confusion. Lorsqu'il est utilisé de cette façon, le terme OSS peut être considérée comme
comprenant le domaine BSS.
3. OSS pourrait être traduit en français par Système de Support Opérationnel pour le différencier de
BSS (Business Support Systems), Système de Support Fonctionnel ("Métier"). Le Support
Opérationnel et le Support Fonctionnel faisant actuellement consensus pour désigner les
fonctions des employés qui s'occupent de ces systèmes (cf. requêtes Google).
OSS : OperationsSupportSystem - OperationalSupportSystem
Un OSS est l'ensemble des composants opérationnels ou les systèmes informatiques utilisés par
un opérateur de télécommunications. Elle est synonyme de maintenance opérationnelle dans le
domaine des télécommunications.
Le terme OSS est habituellement synonyme de systèmes de réseaux informatiques qui
comprend : le réseau de télécommunications lui-même et le maintien des processus tels que la
maintenance du réseau.
Le maintien des processus, avec ou sans automatisation, est assuré par des composants
logiciels back-office qui travaillent en interaction les uns avec les autres et qui sont utilisés dans
différents services :
provisioning
le recensement
la performance et Qualité de service
la gestion de la sécurité
l'inventaire
l'installation et la configuration des composants réseau
la gestion des erreurs réseaux.
5. 3. Retail BillingSystem ( système de facturationde detail )
Rating: Rate each EDR withcorrespondingrate
Billing:Calcultate the fixedcharges…
Bill Production :Produce andprintde invoice
Collection&Payment:can be part of BillingSystemoradedicatedsystem
4. Data Collection
Exchange : ex.Ericsson:AXE,AXD. Huawei:UNO,CDMA
BilligFilesTypes: AMA- AutomaticMessage Accounting(EDRs…),METER.
Front Collector(FC) Function: donnéesde sondage,stockage,…
Central AccessNetwokServer(CANS) :
5. Mediation
Ensemble de functionde traitementsqui sontappliquésauEDRs
Fournirlesdonnéesauendsystem(Billing,assurance revenue,warehouse,…)
Fonctionde mediation:Collection&archive,parsing,appliquerBRs (Normalisation,
filtration,duplicate,…)
Auditing&Reporting :Reporting,Errorprocessing
6. SS7 Monitoring
SS7 Protocol : switches
SS7 Monitoringsolutions:Monitorthe signal entre switchesetgénérerrapportEDR
7. Revenue Assurance :Detectionetcorrectiondesécartsenlessystèmesdesopérateurs
Testcall generator
Faud Management
8. InterconnectBillingSystems
Types Of BillingSystems
1. Offline –Postpaif:
Network Mediator
2. Online –Prepaid:
3. Interconnect:
Facture desconnexionentre opérateurs
Rating,Dicounting,Billing,Reorting
4. Convergentsystems:
6. Fluxtypique de système de facturation (Typical flowof billing system) :
Commande clientetelleestactivée dansle réseau
Clienteffectue sonappel etl’utilisationestreçue,mediatedetcalculé
Clientfacturé etfacture dispatché
Payement
Gestionde recouvrementde ladette
M2M : Machine to Machine
Permetaudispositif utilisantGSMde s’entre envoyé de messageetexécuterlestaches
demandéesdanscesmessages.Etpermetaussi aux humainsd’utiliseràdistance leurssmartphone
OSS and BSS relationship:
La relation basic entre OSS et BSS ou OSS a passé des commandes de services et fourniture
des informations de service assurance à la couche BSS est souvent appelée : « Orders Down,
Faults Up »
Si on a destachesback office,ondoitavoiraussi destachesfrontoffice,eneffetyona. En plusde
précision,ellessontappeléesBSS.Ce sontunensembledistinctd’applicationsqui supporte les
activitéscommerciales,recettesetactivitésorienté client.
BSS Ericsson :
BusinessSupportSystemsofferingsenable effective andcustomercentricbusinessoperations,
allowingfornewbusinessmodelsandinnovativeserviceofferings.
7. Our CSIportfolioisspearheadedbythe BSSTransformationthatisstreamliningtechnology,
processesandorganizationtoconsolidate andevolve BSS,inordertoachieve superiorcustomer
experience,businessefficiencyandoptimization.
Our offeringsinclude Revenue Management,M-Commerce,CustomerRelationshipManagementas
well asBig Data Analytics/BusinessIntelligence solutiondomains,encompassingEricssonBSS
productsand Partnerecosystem.
1. BSS transformation
BSS transformationconsidersthe e2e systemintegrationandsolutionperspective of aBusiness
transformationtoensure customers needsare addressedthroughpropertargetsolutionand
transitionroadmap.
SI BSS Transformationdeliverablesare:
- Requirementtraceabilitymatrix withfitgapanalysis
- Target e2e integrationarchitecture
- BSS Transitionarchitecture
- Informationarchitecture
- TransformationroadmapandRelease strategy
- BusinessTransitionandMigrationstrategy.
2. Business intelligence andDataAnalytics
Data AnalyticsandBusinessIntelligence capabilitiesare keyenablersforthe Enterprise-wide
Optimization,GrowthandInnovationinitiatives,suchasCustomerExperience andValue,Data
MonetizationandEnterpr.Performance.
We engage througha consultative,use case drivenapproach,helpingoperatortorapidlyrealize
value ineachstepof the way,whentransforming intoafuture data andanalyticsdrivencompany.
Our offeringarchitectureisgearedtowardsdata-drivenvaluecreation,andbasedonthree main
horizontal layers:
- Data / InformationFoundationlayer
- Insightlayer(Analytics/Visualization)
- Value Realizationlayer(Applications)Our"datatovalue"value propositionispackagedintothree
offeringareas:
- Enterprise DWHand BI
- BigData AnalyticsandReal-time BI
- AdvancedAnalyticsandOpt.Appl.
3. Customer RelationshipManagement
EricssonCustomerRelationshipManagementsolutionsenableoperatorstoperformthe daytoday
interactionandsupportwiththe customers,whileatthe same time keepinga360 degree view of
the client,inorderto customize thatinteractiontothe clientvalue, preferencesandpotential.
8. While arelativelynew areaforEricsson,CRMis a keycomponentincomprehensive Customer
Experience improvementinitiative,aswell asrequiredcomponenttoprovide afull BSSstackfor
operatorsthat relyonEricssonrevenue managementsystems.
4. Revenue Management
Revenue Managementsolutionsallowsservice providers,inreal-time, tohandle all customersand
services inastreamlined,convergentprocess,coveringpre-paidandpost-paid,voice anddata,
fixedandmobile, retail andwholesale.
Thisofferingcontainssupportforsuccessful sales,solutioninganddeliveryof revenue management
solutions.
Ericsson Convergent Billing and Charging:
Convergentbillingandchargingsolutionsallowsservice providerstohandle all customersand
servicesinastreamlined,convergentprocess,coveringpre-paidandpost-paid,voice anddata,fixed
and mobile,retailandwholesale.
Thisofferingcontainssupportforsuccessful sales,solutioninganddeliveryof convergentbillingand
chargingcustomersolutions.
Convergentcharging&billing=CBIO= binlling+charging= postpaid+ prepaid
Ericsson Billing:
Billingsolutionsgivesservice providersthe convenienceof convergentbillingandcustomercare for
all services,anda choice of service packagestosuittheircustomerslifestyle orbusinessneeds.
Thisofferingcontainssupportforsuccessful sales,solutioninganddeliveryof billingcustomer
solutions.
Billing=Postpaid= BSC
Alex:
BSCS iX4.x forCBiO 3.x ICP 14-04 User Documentaion
Chargingand BillinginOne (CBiO) 3.0.1
Ericsson Charging: Chargingsystem=Prepaid
Chargingsolutionssupportsservice providerstomonetize mobiledataandincrease revenue while
givinguserspersonalizedservice offerings,promotionsandindividual bonusrewardsinbothpre-paid
and convergentscenarios.
9. Thisofferingcontainssupportforsuccessful sales,solutioninganddeliveryof chargingcustomer
solutions.
- Allowsthe operatorstode-coupletechnologyfrombusinessmodel (gestionde l’entprse),such
online creditcontrol forbothpre- andpost-paidbusinessmodels
- Providessuperiorcustomerexperiences, matching the customerlifestyles
Flexible Fields:capabilitytoprovisioninFlexible filedsforend-userex.Get100 SMS in birth
Attributes Use Case
Rate Personal Rate
String Compaignfollow up,personalization
Setof Dates Birthdayoffer,Marriage offer
Setof string Special Numbers
Setof integer External Identities,tailoredpolicy
- Gain configurability
- E2E (Endto End) Businessefficiency
- Deliverconvergentreal-timecharging
o Optimiserbandwidth –control (bande passante ) forqualityof service
o Offerswithlimitedaccessex.1hinternetaccess
o
- Reduce total cost of ownership
- E2E solution
Ericsson Rule Engine: Usedto
- define the configurablelogicof the chargingsystem
- Define productandcampaignsandto implementcharging,Rating,PolicyandRefills.
Horizontal scalability:
- Grow systembasedonneeds,addingadditional computingcapacity whenneeded
CS fitswell (s’intègrebien) intootherBSScomponentsex.EricssonCatalogueManager,Telecom
CRM, EricssonOrder Manager,EricssonMulti activation, EricssonMulti mediation, Ericsson MSDP
Charging systemcomponents:
1. Core Compenents
Upstreamintegration: CS exposesit’sinformationanddatamodel throughOpenAPIsfor
north-boundsystemslike CRMandproduct cataloguessystemstointegrate withcbio
UserCommunication:End usercommunicationisdone fromCSwhenitis relevantfor
the customer
CS offerspublicAPIcanintegratedforondemandinfos,Voice IVRforautomatedteller
Keepuserinformedinreal time abouthisaccountstatus,bonusesandoffers
Rule Management: CentralizedRule configurationandmanagementtool
Rate-plans,refill-plans