Anda di halaman 1dari 16

Nokia Siemens Networks Flexi ISN

Implementing fair service usage policies for peer-to-peer traffic

2007

Nokia Siemens Networks Flexi ISN

Peer-to-peer traffic: a new generation of communication

Towards flat-rate access charging in mobile communication Operators are increasingly introducing flat fee data subscriptions to boost the use of mobile data applications. New, high-speed technologies such as High Speed Packet Access (HSPA) and Internet HSPA (I-HSPA) enable large data volumes that demand simple tariff structures. Competition from alternative access providers such as wireless LANs and WiMax is also forcing operators to simplify their tariffs. Flat fee data subscriptions are offered either in limited steps or as an unlimited subscription. Flat rate Internet access is increasing mobile data volumes Operators that have introduced unlimited flat fee subscriptions have experienced a very small number of users consuming a significant portion of network capacity. The heavy users typically use a laptop with a 3G/HSDPA data card to download movies, games and music clips using peer-to-peer (P2P) file sharing applications. Radio networks are not able to support unlimited P2P file sharing traffic P2P file sharing applications are typically bandwidth-greedy and attempt to consume all available bandwidth in the network. The P2P file sharing load will tend to exceed any dimensioned bandwidth in the network. This is likely to result in congestion in bandwidth-limited mobile networks. Large file downloads are typically performed as background activity so there is very little daily variation in the P2P file sharing load, which stays almost constant around the clock. In addition to entertainment, P2P file sharing applications are also used for software distribution. For example, Linux developers share distributions over common P2P networks. Living with free Internet calls Internet service providers such as Skype, Vonage and many others with Voice over IP (VoIP) solutions have been making headlines and pose a threat to the voice businesses of both fixed and

Operator comments on the effect of P2P traffic Data traffic in our network doubled in ten days when we introduced the HSDPA access network. Our most active users generate 195 Gbytes of traffic in a month, while the average is as high as 9 Gbytes. 60% of the traffic in our network uses unidentified protocols. We would not like to introduce flat fee tariffs but competition forces us to offer that. We launched unlimited flat fee data packages but had to switch back to the old model because the service was immediately misused and our network was not able to handle the data volumes. Fewer than 1% of all the subscribers generate 95% of data traffic. We cannot justify the capacity investments with just flat fee pricing plans. We must also be able to charge for premium services. We need to use our network capacity more intelligently.

mobile operators. Many of these free Internet calls are made using downloadable freeware programs that allow VoIP calls. Calls between users over the Internet are free, with only calls in and out to mobile or fixed numbers incurring charges. P2P applications use the operator network as a bitpipe P2P applications typically bypass the operators business logic in different ways, either with free or low-cost delivery of high-value traffic, such as VoIP or P2P messaging. These applications use the operators network as a pure bitpipe and the revenue may not be enough to cover the costs of carrying the traffic.

P2P applications use innovative business models Many of the P2P application clients are publicly available freeware that can be downloaded from the Internet. On the other hand, there have been numerous partnerships between P2P service providers and world-class companies, including operators and device vendors, and a wide selection of compatible hardware devices is already available. Multiple business models exist for P2P services. It is likely that P2P technology will be commoditized and money is made elsewhere, in content, communication, devices and networking, for example. P2P applications and related businessrevenue sources include: software sales consumer electronics advertising in P2P clients and portals content sales calls to and from public voice telephony system sales of usage statistics and analysis sales of detection and control equipment. P2P traffic dominates in fixed networks P2P file-sharing traffic has been the single largest traffic type by volume on Internet Service Provider (ISP) networks for years and continues to grow. The largest volumes are generated by file-sharing applications in both the uplink and downlink directions. These applications are typically used for sharing movies, music files and games.

Peer-to-peer file sharing load exceeds the network capacity

Characteristics of P2P technologies P2P networks rely on the computing power and bandwidth of the participants in the network, rather than concentrating it in a relatively low number of servers. The peers are mutually exchanging information and services using direct connections, often without any server intervention. P2P applications are typically applied to create ad hoc connections between the P2P network nodes. Example applications include VoIP, instant messaging, file sharing, distributed computing and gaming.

P2P traffic is emerging in wireless environments New cellular and wireless access technologies such as UMTS, HSPA, I-HSPA, WLAN and WiMAX are boosting mobile users data volumes. The same technologies also facilitate the use of disruptive P2P applications. Applications and services that are popular among fixed access users today are very likely to become popular in the wireless domain in the near future. The mobile world will catch up with HSPA and Internet HSPA, allowing new applications to be introduced simultaneously in both fixed and mobile networks.

2007

Nokia Siemens Networks Flexi ISN

P2P traffic: threats and opportunities for mobile operators

Wireless network and handset evolution is boosting wireless P2P adoption In advanced markets, barriers to mobile P2P are disappearing. Mobile data cards are widely available for laptops. Multimedia computers with reasonable processing power, storage capacity, battery consumption and networking capability are becoming more affordable. HSPA networks are becoming more widely available, offering access to reasonably priced Internet services with access speeds comparable those of fixed networks. Several P2P applications are already available for mobile phones, and more are being constantly developed. P2P application usage is increasing with flat fee data plans becoming part of mobile operators subscription portfolios. Battery life will remain an issue in truly mobile use, especially for bandwidth greedy, always-on applications such as VoIP. This is predicted to slow down the usage of P2P communication services. However, battery consumption is not typically an issue for laptops running file sharing applications.
BitTorrent implements a scalable P2P file distribution system

Uncontrolled P2P file sharing applications incur network investments Rapidly increasing traffic causes congestion and increases transmission delays. This further increases the pressure to invest in additional radio access network capacity, both in base stations and controllers (CAPEX) and in transmission capacity between base stations and controllers (OPEX). It also leads to a poor end-user experience of the operators services, which translates into increased subscriber churn. P2P file sharing traffic profile is symmetrical Unlike the currently popular mobile data services such as browsing and content downloading, the P2P file sharing traffic profile is symmetrical, with the amount of uplink and downlink traffic almost equal. This is because of the way in which file sharing networks work. As a user downloads content from the file sharing network, the users P2P client automatically shares the downloaded content with other members of the P2P network. Mobile data networks are typically dimensioned to carry asymmetrical traffic, which increases pressure to invest in upstream capacity.

Peer-to-peer applications are bypassing operator business logic

BitTorrent: an example of a P2P file sharing application BitTorrent clients are freeware that can be downloaded from the Internet. BitTorrent clients can prepare, request, and transmit any type of file over a network using the BitTorrent protocol. End users share information on files that they provide for others to download. The available content information is shared in several different web sites, where users can check how many peers are currently sharing a particular file. BitTorrent implements a scalable file distribution system. The client breaks the files into small pieces. Downloading peers share the uploaded content simultaneously and uplink traffic from an individual peer is not a bottleneck. P2P communication is challenging operators services Voice is expected to remain the main source of revenue for mobile operators for the foreseeable future and operators must protect it. Todays GPRS networks are only capable of charging third-party VoIP and messaging services at bulk data tariffs. This offers attractive opportunities to mobile

subscribers but means a potential loss of revenue for mobile operators, especially loss of revenues from international voice calls and roaming. For operator provided and partnered VoIP services it is essential to be able to ensure that enough bandwidth is available. Voice quality easily suffers from delay and jitter, so VoIP services must be prioritized over non-realtime services to maintain an acceptable level of quality. Moreover, P2P instant messaging is threatening to cannibalize revenues from SMS, MMS, and the operators own instant messaging and presence services. P2P services threaten the operators subscriber ownership In addition to direct revenue loss, operators also risk losing the control of end users to third-party service providers. The operator may end up in acting as a transparent bit pipe for data services with significantly decreased circuit-switched voice and SMS revenues. However, it should be noted that VoIP over cellular will not be a substitute for a cellular voice service for several years owing to technological limitations.

2007

Nokia Siemens Networks Flexi ISN

Flexi ISN provides special tools for P2P traffic detection

The challenge of tracking P2P applications Standard protocols have lacked support for P2P capabilities before now. This led P2P application developing communities to implement new proprietary protocols. As a consequence, P2P applications cannot necessarily be identified accurately using protocol signatures. Some of the popular P2P protocols have been intentionally designed to hide in order to bypass network firewalls, Network Address Translation (NAT), and application-aware traffic-shaping solutions. Furthermore, frequent client updates modify the protocols behavior, thus making its detection even more challenging. Flexi ISN applies multiple means to detect P2P traffic In practice, traditional deep-packet inspection with protocol analysis is not enough to track P2P applications. In general, Flexi ISN applies three basic approaches to P2P traffic detection. Application signatures detection: In this approach, protocol-specific patterns inside the packet payloads are searched. When applicable, this approach in principle provides 100 percent accurate protocol detection. The drawbacks are that new or updated protocols cannot be detected automatically. The pattern has to be updated in the detection engine. Application-level pattern search in each transport packet also generates a significant processing load for the analyzer. Some P2P protocols encrypt their payloads, which makes the analysis even more difficult. Transport layer port identification: Here the transport layer ports used in the examined traffic flows are compared against known P2P application ports. This approach can also work with encrypted protocols and is very efficient from a performance point of view. However, almost all of todays P2P protocols use variable or wellknown non-P2P protocol port numbers (HTTP, FTP and so on) to deliberately avoid port-based identification and get past firewalls. In addition,

this method cannot automatically adapt to protocol changes or new protocols. Network/transport layer heuristics: This approach typically uses a set of network/transport layer patterns (such as the simultaneous use of TCP and UDP between peers or packet size distribution, for example). To optimize the processing load, heuristic algorithms typically apply stepwise protocol identification. If the protocol is not identified with first-step analysis, the algorithm passes the examined packets to the network and waits until the next time the clients communicate. This type of approach typically has a good performance and can also be used to detect traffic associated with unknown P2P protocols. However, it is possible to build P2P protocols such that they cannot be detected with this method. Most P2P protocols are detected by using the application signature or pattern matching method. The heuristic method is typically used to detect encrypted protocols, such as Skype. Aiming at maximum accuracy in protocol detection Our goal is to implement accurate protocol/ application signature-based identification mechanisms whenever feasible, to achieve as close to 100 percent accuracy as possible. Heuristics are used only for those protocols which cannot otherwise be analyzed. This approach gives the operator: best-in-class identification accuracy minimum protocol identification time. Another option is that several algorithms can be applied for the same P2P client communication attempt. This, however, leads to an unpredictable processing load, making it impossible to accurately predict the processing load incurred by the analyzing device. The nature of heuristic algorithms also means that they cannot provide 100 percent accuracy.

Adjusting operators service offerings Gathering statistical information on P2P usage provides operators with information on which groups are using P2P applications and the behavioral patterns associated with P2P services. This information can be applied to modify the operators service schemes so that they become a more attractive alternative to the third-party P2P applications. Combining service usage information with subscription information allows the operator to identify P2P service users and to launch targeted marketing campaigns to these user groups. As an example, the production cost of a third-party VoIP call for a WCDMA/EDGE mobile operator is currently significantly more than that of circuitswitched voice call when comparing the radio network capacity investment. A circuit-switched voice call typically requires a transmission rate of 12 kbps, whereas popular VoIP applications typically use at least 30 kbps in one direction. Modifying Quality of Service If P2P traffic is allowed to grow unchecked, Quality of Service (QoS) control can delay the

need for network investments to manage the increasing traffic volumes, although it will not defer it indefinitely. Operator-provided services can be protected by managing the priority and bandwidth allocation for P2P applications relative to other applications. Different mechanisms have to be applied depending on the problem to be solved. QoS can control end-user experiences of service quality, Gn and Gi interface dimensioning, GGSN overall resource management and backbone dimensioning. Notice that according to 3GPP specifications, the QoS parameters are defined in the PDP context level and several applications typically use the same PDP context. If a real-time and a non-real-time application use the same PDP context, providing real-time QoS for the realtime application implies that the non-real-time application receives the same treatment. This results in inefficient use of network capacity.

Different traffic management tools are applied in different parts of the network

2007

Nokia Siemens Networks Flexi ISN

Flexi ISN provides multi-dimensional bandwidth management

Multidimensional bandwidth management

Access and location: Bandwidth and service usage can be controlled according to the access network type and subscriber location. An example of control based on the type of access network is to limit the capacity for file sharing services in the cellular network but allow unlimited use in the WLAN network. Location awareness functionality allows services to be accessible only in defined area(s) of the network or limits capacity usage according to the subscribers location. For example, the operator may allow P2P file sharing services only in the subscribers home zone. Service-specific bandwidth management Flexi ISN allows the operator to manage capacity allocation at the service level. The maximum bandwidth available for identified services and applications can be limited to a configurable value, in terms of aggregate traffic and at the level of an individual subscriber. This function has been developed to ensure fair sharing of network resources between subscribers and services. Multi-dimensional bandwidth management Multi-dimensional bandwidth management is possible by combining P2P traffic detection capabilities with the subscription, access and location awareness capabilities that Flexi ISN offers. Subscription: Fixed broadband-type charging models can be applied in mobile networks. The operator can provide subscriptions where the maximum access rate is limited to a certain value. This provides a differentiated offering for subscriber segmentation, in which subscribers pay according to their maximum access rate. P2P service usage can also be included or excluded in the subscription at the service level. Application: At the application level, Flexi ISN P2P traffic detection capabilities allow the operator to differentiate the treatment of different P2P applications. Bandwidth limits can be set and application usage can be blocked, even though the P2P service may be using the same PDP context as an unlimited service, such as browsing. Time of day: Flexi ISN allows traffic policing rules to be configured differently according to the time of day. P2P file sharing traffic profile is typically symmetrical. Since subscribers are downloading files as a background activity, there is no variation in the traffic load according to the time of day. In contrast, other data traffic experiences heavy variations. The operator can offload the P2P traffic load during busy hours and allow more P2P usage during quiet times. Policing rules can also be configured per day to differentiate traffic treatment between weekdays and weekends. Policing P2P traffic Flexi ISN can apply traffic policing to any identified traffic flows, including both traditional protocols and P2P traffic. Policing can be performed in both the uplink and downlink directions. The operator

can set a maximum limit on the bandwidth usage per application. Limits can be applied both at the individual users level and on aggregate traffic to limit bandwidth usage to an appropriate level. Charging for better quality Operators typically charge for services they provide themselves or together with partners. Basically, operators are not allowed to charge, for example, for third-party VoIP applications using their regular CS voice tariffs. They can only charge for the data they transmit. One opportunity is to make service level agreements for P2P services, such as P2P services provided by partners, by guaranteeing higher service quality. Flexi ISN, servicebased traffic management makes it possible to guarantee that enough bandwidth is available for preferred applications. Flexi ISN supports the DIAMETER interface for online charging control for the benefit of both the operator and subscribers. Flexible charging options allow operators to implement tariff models that best match their business strategy. Bundling P2P services with subscriptions Operators may seek additional revenues by bundling P2P services with selected subscriptions. Nokia Siemens Networks Flexi ISN provides service and subscriber awareness that enables operators to differentiate between service packages. The availability of P2P services can be controlled with subscriptions. Subscribers to P2P services may enjoy better QoS (for example realtime traffic class support or guaranteed bandwidth). Non-subscribing users may be banned and/or barred from using P2P services, or lower QoS can be provided when they use these services.

Policing according to the time of day

Flexi ISN applies traffic policing per service on individual users level and on aggregate traffic level

2007

Nokia Siemens Networks Flexi ISN

Centralized traffic management with Flexi ISN

The first GGSN integrated P2P traffic tracking solution Flexi ISN is industrys first integrated solution for P2P traffic identification and control. Flexi ISN is a high-availability, high-capacity connectivity and control element that offers service access for mobile users, independent of access method. Flexi ISN is designed to act as a central control point for data services. It is a gateway for providing mobile users with data connectivity in cellular networks as well as serving other wireless networks. Traditional deep-packet inspection and protocol-based traffic analysis functions are available to track all standard protocols. However, this is not sufficient to track all P2P traffic properly, so heuristic detection algorithms are also supported. Subscription awareness Supporting subscriber profiling, Flexi ISN can download subscriber profiles from the subscription management system. This information can be applied to authorize users to use both operatorprovided and Internet-based services, to manage service subscriptions, to differentiate service tariffs for different user groups, to manage bearer services on a subscription basis and to differentiate subscriber access to the services. Flexi ISN provides information on service usage at the subscriber level by combining service information with subscription information.

Access, location and roaming awareness Access type awareness allows Flexi ISN to control service and application usage based on the access type. The supported access types are UTRAN, GERAN and 3GPP WLAN. Location Awareness allows services to be accessible only in defined area(s) of the network. For example, the operator may allow P2P file sharing services only at the subscribers home location. Applied parameters are: Mobile country code (MCC) Mobile network code (MNC) Location area code (LAC) Cell identity (CI) (for 2G network) Service area code (for 3G network) Flexi ISN roaming awareness allows operators to control the service usage according to the subscribers roaming status. For example, they may restrict service availability for outbound or inbound roamers. They may confine P2P file sharing services to local subscribers in their home network, for instance.

10

Comparison: Integrated Gn solution vs external Gi solution Flexi ISN


CAPEX OPEX External connections Integration and interfaces Single element No extra OPEX Single connections to control elements No extra integration; open interfaces

External Gi device
Extra elements Extra OPEX: e.g. duplicated provisioning, charging and O&M Duplicated connections to controll elements Extra integration work (online and offline charging systems. provisioning and policy control)

Management Scalability

Single tool for managing Separate tool for P2P all traffic management The only seriously scalable deep packet inspection system in the market Yes Committed evolution path and support Compliant Different capacity steps in GGSN and P2P device No Gn and Gi interface evolution differs by vendor Not compliant No differentiation Adds delay, latency, jitter and packet loss both in user plane and control plane No No standard way to manage QoS Not available Not available Mostly no Diameter support. Challenges in charging interface evolution. Charging control requires correlating information from GGSN and the external Gi device Dropped uplink traffic is erroneously charged in GGSN Not available

Redundant PDP contexts Solution evolution LTE architecture compatibility

Secondary PDP context Primary and secondary PDP context traffic can be differentiated End user experience for real time traffic Subscription based control Radio network QoS control Access awareness Location / roaming awareness Charging interface Minimum latency, delay, jitter and packet loss Yes 3GPP QoS control and Service Aware QoS Access specific user policies can be applied Location / roaming based end user policies can be applied DIAMETER support. Integrated online charging control. Integrated step based charging. Fair usage policy: Service usage can be limited online, e.g. maximum limit to monthly data usage Only carried traffic is charged Available

Charging models

Charging policed traffic Single APN, APN aliases

11

2007

Nokia Siemens Networks Flexi ISN

Flexi ISN offers an integrated solution for a phased introduction of P2P traffic management

End-to-end network load monitoring

P2P traffic monitoring is an end-to-end issue P2P protocols and applications are here to stay and their usage is set to increase in both fixed and mobile networks. The associated challenges cannot be solved with add-on or point solutions, but operators need to make P2P traffic monitoring and management an integral part of their network architecture evolution strategy. P2P management solutions must be part of generic network monitoring and management solutions, and the same tools that apply to other applications and services have to apply to P2P traffic in order to enable consistent network evolution. P2P protocols and applications consume network resources at all levels, in radio, core and transport links. Gi interface-based solutions provide information only on the user session but

are unaware of the associated signaling and user data load in the radio and core network. In the Gi interface it is also challenging to associate multiple traffic flows from multiple PDP contexts with the same subscriber. Thus, traffic monitoring in the Gi interface is clearly not enough. End-to-end monitoring and management is needed. Our solution offers comprehensive P2P traffic information Our expertise in P2P traffic detection and management covers the entire operator network, from radio access to the packet core. The Nokia Siemens Networks NetAct network management tool gathers statistical information from both the radio and the core networks. With NetAct, the generic load in the radio network can be monitored. If the radio network load is

12

06/07

Document title
Flexi ISN interfaces with the operator network control machinery and allows phased introduction of peer-to-peer control

increasing, an operator can use NetAct to discover from the Flexi ISN whether the reason for the increased load is growing P2P traffic, for example. Also, when Flexi ISN P2P control policies are applied to the traffic, operators can use NetAct to see the effect on the overall radio network load. Information on P2P application usage P2P service usage information can be used for operator network planning decisions, for service and tariff schemes and for possible partnering with P2P application providers. Flexi ISN provides information on P2P application usage on multiple levels. Used service Radio access type Number of PDP contexts Data volumes Volume of dropped data Usage time for SIP sessions All usage data is provided with associated subscriber identity information. An integrated solution for a phased approach to P2P traffic management Gathering P2P service usage information is generally the first thing that operators want to do to examine the impact of P2P on their network. The Flexi ISN provides subscriber-specific information on application usage in XML-based charging detail records (CDRs), which allows for measuring the P2P application load in the network. Also, service level statistics can be delivered through network management protocols (SNMP) to the monitoring systems. Integration with the operators charging and service control infrastructure is necessary to enable control of P2P application usage. Flexi ISN provides standard interfaces that, when integrated with provisioning and charging subsystems, allow P2P applications and protocols to be controlled in the same way as existing non-P2P applications and protocols. Thus, as the P2P analysis solution

in Flexi ISN evolves, there are no implications for the charging and service control infrastructure. P2P traffic control can now be applied based on multiple criteria: subscription, access type, location, application and the time of day. The traffic management tools that are applied for P2P traffic management are the same as those applied for managing operator and operator partnerprovided services and applications. The unified control machinery offers substantial savings in both OPEX and CAPEX.

P2P in action Peter Patterson has a HSDPA card in his laptop PC. He enters a cafeteria, buys a cup of coffee and sits at a table. He launches a BitTorrent client on his laptop and starts downloading a large movie file over the network. Simultaneously, he contacts his friend Sammy to arrange to see a movie in the evening. During the VoIP call he browses the Internet to check out the movies in the nearest theaters. The BitTorrent download continues in the background. Flexi ISN is able to provide the following statistics on subscriber behavior: The total amount of browsing and P2P traffic transmitted The type of all three applications used The location of the subscriber With Flexi ISN the operator can apply service bandwidth management to all three types of traffic that are carried in the PDP context. As an example the operator may limit the BitTorrent capacity to make sure that other applications work sufficiently well and protect other users against file sharing taking an excessive amount of bandwidth.

13

2007

Nokia Siemens Networks Flexi ISN

A comprehensive, network-level approach to P2P control

Keeping up with latest developments To retain existing subscribers and expand their business, operators must be able to maintain a high level of service quality in the end-user experience. This requires traffic management machinery to evolve at the same pace as new protocols and applications. In selecting a partner for P2P traffic management, a key consideration is how the updates in P2P protocol identification capabilities are performed. Despite changes and modifications to the P2P applications and protocols, upgrades in the traffic identification tools must always be made in a similar manner. Only this approach gives the operator enough confidence about the operations and maintenance burden associated with the Internet access service when new P2P signatures are applied. In Flexi ISN, the P2P traffic identification capability is implemented as an independent unit in the software. P2P tracking capabilities can be upgraded in the Flexi ISN node without incurring any service downtime. Changes in P2P protocols are to be expected P2P application developers are not actively developing signaling stacks or transport protocols, concentrating instead on application development. It is likely that in the future, tailored protocol stacks and transport protocols will be available and the applications will be built on these. The underlying protocols may change at very short notice and the signature definitions potentially change every time the P2P protocol is modified. The operator has to have confidence in the vendor providing the upgrades in a regular manner and within a set time. Nokia Siemens Networks is committed to support Flexi ISN-based P2P traffic management, which is an essential element of added value in our core network product portfolio. Making it easy The complexity of the P2P application and protocol identification task makes it essential

for the vendor to provide fully configured traffic analysis machinery. Even small mistakes in the configuration may damage an operators network business and image. In order to fulfill these requirements, Flexi ISN implements active protocol analysis libraries. The user interface enables selected P2P protocols to be tracked with a single click. This hides the complex protocol details from the operating personnel and removes the risk of wrong configurations arising from a misunderstanding of P2P protocol functionality. Turning the threats into opportunities While mobile VoIP and P2P applications have the potential to threaten operators incomes by transforming them into little more than bitpipe providers, new opportunities for operators are also emerging. With network management and traffic monitoring solutions offered by Flexi ISN, operators can gain fresh insights into their subscribers behavior and preferences. Using this information, operators can offer subscribers bundled P2P services (possibly provided in conjunction with selected partners) with high service quality and guaranteed bandwidth. These services can help operators to differentiate their offerings and establish new revenue streams from existing and new subscribers. Rather than failing to meet the challenges of the fast-changing mobile communications ecosystem, operators can now make the most of exciting new opportunities. The only seriously scalable deep packet inspection system on the market Our ISN solution has been in commercial use in live networks since 2003. Traditional service awareness is now extended with advanced P2P traffic handling capabilities that can be managed with the same tools as the traditional protocols. We are the only vendor able to provide a seriously scalable deep packet inspection system. Thanks to the ingenious architecture of Flexi ISN, we can

14

Extending traditional service awareness to peer-to-peer applications

provide a service awareness solution in which the capacity does not drop when deep packet inspection and other traffic identification tools are applied. We provide solutions to manage P2P traffic according to your preferred business models Identifying applications and measuring their effect in the network end-to-end Protecting value-added services against excessive P2P file sharing loads Ensuring fair sharing of network resources among subscribers and applications Enabling controlled usage of flat fee tariff models for mobile Internet access Prioritizing selected applications Enabling partnering and revenue sharing with Internet-based service providers

15

Nokia Siemens Networks Corporation Karaportti 3 FI-02610 ESPOO Finland

Copyright 2007 Nokia Siemens Networks. All rights reserved. 05/2007 Activeark

www.nokiasiemens.com

Anda mungkin juga menyukai