Ask The Broadband Pundits

Welcome to the 1st “Ask the Broadband Pundits” Blog Post. This is where we post the response to the queries that come in. This is first of the monthly series blogs where we post the responses for the queries of operators. For posting Queries, please visit Is it possible for the operators to move

Is it possible for the operators to move to LTE or WiMAX services using the legacy network infrastructure already in place? If yes, what are the key steps for successful migration?

While most of the revenue (almost 70%) still comes from Voice and SMS services and all business models revolve around how to deliver the services more efficiently, it becomes inevitable to move to latest technologies for multitude of reasons. Hence many operators across the world, who are using disparate technologies are currently planning migrate to the LTE or WiMAX technologies.. While it is possible to deliver the LTE over the legacy networks, there can be a number of technical issues in dealing with the day-to-day operations in continuing with the legacy systems like extended call set up times, inefficient use of available spectrum, poor quality of service etc. Many operators initially moves to IMS (IP Multimedia Subsystems) platforms to make everything IP centric, test out the process success and then make a calculated move to LTE.

What is LI (Lawful Intercept) and DPI (Deep Packet Inspection)?
Lawful Intercept:

Lawful intercept is the process of collecting the user data for analysis and reference as part of electronic surveillance conducted by law enforcement agencies, which is mandatory by law in most countries across the world. The function mandates to collect the usage details as well as user info from network elements which should support the electronic surveillance. The data is used for further analysis and appropriate decision makings.

Currently, they are many hardware equipment providers who are currently providing LI solutions with a software hardware combination. These solutions have the ability to peep into the network, collect the necessary information, convert into necessary format and store for the pre-defined amount of time so as to perform analysis and arriving at decisions.

DPI (Deep Packet Inspection):

Deep Packet Inspection is a mechanism to inspect the packets of data being transferred through a network. Due to this inherent nature, many operators and enterprises are equally leveraging on this technique to know what programs are actually using up the bandwidth. Now there is really no need to describe the obvious business sense in this, which is restricting people from accessing certain specific sites (typical parental control). However, some operators are putting this to a better use. Operators are leveraging on this feature to optimize their network while addressing their customer requirements. For example, a segment of business users are using only mailing for their business, so there is not much sense in charging them for large data packages which cost a bomb, while the operator has to make money from its users. This win-win situation can be achieved by achieved using DPI.

For any specific queries on DPI, feel free to contact us.

Check out this space every month for new blog posts.

Related Posts

Leave a comment