Download as pdf or txt
Download as pdf or txt
You are on page 1of 63

Ribbon Call TrustTM and Ribbon VoLTE Monitoring Solutions

Andrew Yeo
ayeo@rbbn.com
30
1
April 2022 Ribbon Communications Confidential and Proprietary
Disclaimer

• The purpose of this presentation is to make available to Ribbon's existing and prospective
customers on a confidential basis certain information with respect to Ribbon's current product &
service development plans, schedule and strategy.
• Except as specifically authorized in writing by Ribbon, the holder of this document shall keep the
information contained herein confidential and shall protect same in whole or in part from disclosure
and dissemination to third parties and use same for evaluation, operation and maintenance
purposes only.
• Please note that these plans are provided for discussion purposes only and that information
concerning Ribbon's plans and schedules to develop, make available and release any of the
products, services, features and functionality described herein is subject to change from time to time
by Ribbon.
• This presentation neither commits nor obligates Ribbon or any of its affiliates to pursue or undertake
the development or release of any product, service, feature or functionality in accordance with any
timetable. Also, it does not constitute a license or any other right to use or acquire any product,
service, feature or functionality described herein and should not be relied on in making a purchase
decision. Ribbon undertakes no obligation to update this presentation or any information contained
herein.

2 Ribbon Communications Confidential and Proprietary


Contents

• The Problem – Caller ID Spoofing, Robocalling & Fraud

• Regulatory and Legislative Update

• STIR/SHAKEN

• Ribbon Call TrustTM

• Ribbon Secure Telephone Identity (STI)

• Ribbon STI Licensing, Sizing, and Deployment

• Summary

• Ribbon Reputation Scoring Solutions

• Ribbon VoLTE Monitoring Solutions

3 Ribbon Communications Confidential and Proprietary


The Problem – Caller ID Spoofing, Robocalling & Fraud
Caller ID Spoofing

• Overwhelming problem - too many instances of Caller ID spoofing


– FCC, FTC, and DOJ prioritize which illegal spoofing activity to investigate because they do not
have resources to pursue them all
– Investigations prioritized based on the level of harm being perpetrated and the likelihood of being
able to bring an enforcement case

• Reality is there is “very little” regulatory enforcement


– FCC, FTC, and DOJ identified only 62 enforcement cases between 2006 and 2019

• VoIP technology enables fraudsters to “easily change both physical locations and
numbers they spoof”

• An industry-wide approach is only way to address this

5 Ribbon Communications Confidential and Proprietary


US Robocalls

Source: YouMail Robocall Index


Source: YouMail Robocall Index

6 Ribbon Communications Confidential and Proprietary


The Result - Customers Lack Trust in the Phone

• I don’t want to answer calls from anyone I do not know

• I ignore calls that come in without calling name

• I think most calls today are spam, so I ignore them

• I wish my service provider would stop these annoying calls

• I wish my service provider would tell me when a call is “bad”


Unhappy customers + Calls NOT answered + Businesses suffer
7 Ribbon Communications Confidential and Proprietary
Regulatory and Legislative Efforts
Key US Regulatory Dates

31 March 29 September

FCC 20-42 Report and Order & FCC 20-136 Second Report and Order
2020 Further Notice of Proposed • 2-yr extension on STIR/SHAKEN for small, rural providers with
Rulemaking less than 100,000 subscriber lines
• Mandates all voice service providers • Respond to traceback requests in a timely manner
implement STIR/SHAKEN by June • Take affirmative, effective measures to prevent new and renewing
30, 2021 customers from using its network to originate illegal calls

FCC DC 21-454 Public Implementation Deadline Outbound Calls Not Accepted


Notice • STIR/SHAKEN implementation • Intermediate and terminating
• Originating robocall mitigation service providers prohibited from
2021 • Announces Opening of accepting traffic if you are not
Robocall Mitigation DB for program
listed in FCC Robocall Mitigation
filing • Filing of status in FCC Robocall DB
Mitigation DB

20 April 30 June 2021 28 September 2021

9 Ribbon Communications Confidential and Proprietary


International Regulatory/Legislative Snapshot

Canada
– CRTC on same path as FCC to implement STIR-SHAKEN. Ruling 2019-402 proposed
implementation by June 30, 2021. Ruling 2021-123 just extended deadline to November
30.

Australia (ACMA)
– Focus on robocalls and fraud with Do Not Originate (DNO) and Wangiri as Phase 1 trials

Singapore
– Robocall mitigation requirements being specified

UK (OFCOM), France (ARCEP), UAE, Saudi Arabia


– Investigative stages, looking into STIR/SHAKEN within country and for signing calls for
US interconnect traffic

10 Ribbon Communications Confidential and Proprietary


STIR/SHAKEN
STIR-SHAKEN: Technology to Battle Call Spoofing
The protocol, the functionality
STIR (Secure Telephony Identity Revisited)
 standardized by IETF and defines a signature to verify the calling number, and specifies
how it will be transported in SIP “on the wire”

The framework, the architecture


SHAKEN (Signature-based Handling of Asserted information using toKENs)
 framework developed by the ATIS/SIP Forum IP-NNI task force to provide a STIR
implementation profile for service providers. STIR/SHAKEN will be the basis for
authenticating calls and facilitating the ability to trust the caller ID information
The idea behind STIR/SHAKEN:
Apply security and digital certificate technologies to phone calls, similar to web transactions, and combat
spoofing to increase the chances of a consumer answering the call

12 Ribbon Communications Confidential and Proprietary


SHAKEN Framework

Governance/Policy
Service Provider Validations
REG STI-GA STI-PA STI-CA
REG: Regulator
STI-GA: STI-Governance Authority External STI-
STI Public Key
STI-PA: STI-Policy Administrator Service Provider Certificate VS Verification
Code Token Requests Requests
STI-CA: STI-Certification Authority Requests

Private STI Public


Key Management SKS Key(s) SP-KMS Key STI-CR
Certificate(s)
SP-KMS: Service Provider-Key Management Server Private STI Public
Key(s) Key
STI-CR: STI-Certificate Repository
Certificate(s)
SKS: Secure Key Store
STI-AS STI-VS
Call Management List of Valid STI-CAs

STI-AS: STI-Authentication Service Carrier Domain Components

STI-VS: STI-Verification Service

13 Ribbon Communications Confidential and Proprietary


Call Authentication and Verification

Calling Party Called Party

SIP Header
STIR/SHAKEN STIR/SHAKEN
Authentication Service Verification Service w/Verification
Status

Authentication, Verification,
Attestation Treatment

Originating Terminating
Transit Carriers
Carrier Carrier

Attestation/Trust Indicator=“A, B or C”

14 Ribbon Communications Confidential and Proprietary


Ribbon Call TrustTM
An Identity Assurance Solution
Hierarchy To Restore Customer Trust in the Phone

Cloud
(Ribbon
SaaS)
Reputation Scoring
Real-time actionable
information for call treatment
Identity Assurance
SP Analytics
network
Analysis of call traffic to identify potential
bad actors (trust context)
SP network or cloud
(Ribbon SaaS) STIR/SHAKEN
Caller ID authentication, signing, verification
SP
network Session Border Control, Policy & Routing, Gateways, Call Control
Call attestation/verification requests, call validation treatment
16 Ribbon Communications Confidential and Proprietary
Ribbon Call TrustTM - Complete Identity Assurance Solution

3rd Party
STI
CNAM
Caller National
Service
Identity analytics data
rd
SBC/GSX/3 Party
Originating
Identity STIR/SHAKEN
Context Client as a Service
requests &
Policy & Routing responses
Cloud Ribbon
Originating Reputation Identity DB
Carrier Scoring MNOC
Call Processing 3rd party policy

Real-time
Transit Non-real time
Carrier Behavioral (potential bad actor) information
Customer
analytics

Network Operators
Reject; Deflect; Inform

17 Ribbon Communications Confidential and Proprietary


Ribbon Secure Telephone Identity (STI)
Ribbon STIR/SHAKEN Solution In Service Provider Network

• New features on Call Controllers, Session Border


Controllers and Gateways
Caller
Identity
SBC/GSX/3rd
Party • New features on Policy / Routing Server (PSX)
Session
Control
Policy & Routing • Secure Telephone Identity – for call authentication
or call verification and interworking for certificate
management
Call Processing
Trust
Context

Real-time

Network Operators

19 Ribbon Communications Confidential and Proprietary


Ribbon - Call Authentication In Service Provider Network

Signing
request/responses
OR

3rd party
STI-AS/VS

Authentication
requests/responses

3rd party SBC/GW


or SIP Server

INVITE INVITE
no Identity Header w/Identity Header
“Spam Indicator”
in the CDR

Attestation/Trust Indicator=“A, B or C”
20 Ribbon Communications Confidential and Proprietary
Ribbon - Call Verification In Service Provider Network

Verification
request/responses
OR

3rd party
STI-AS/VS
Verification
requests/responses

INVITE INVITE
w/Identity Header w/Identity Header
Called Party
“Spam Indicator”
in the CDR

Attestation/Trust Indicator=“A, B or C”
21 Ribbon Communications Confidential and Proprietary
Ribbon – Secure Telephone Identity In Service Provider Network

STI-A
Our customers:
• Support all STI authentication and
verification functions
• Public/private public key management
• Interworking with STI-CA and STI-CR
functions

Standards supported:
• RFC 8224, 8225, 8226, 8443, 8588
• ATIS 1000074-E, 1000080 1000082,
1000084,1000085 for “div” PassporT
• 3GPP TS 24.229 (ISC and verstat)

22 Ribbon Communications Confidential and Proprietary


When STI May Not Be Needed - Originating Switch Attestation & Tagging

Service Provider Network

Origination Tag (P-Attestation and P-Origination) Termination

Calling Party

Verification
Status
Attestation/Trust Indicator=“A”

• Signing and Validation is compute and resource intensive


• May not be needed for calls between elements within a network, use C15
and C20 Tagging and Termination
• Calls are signed only if they need to be sent to another operator

23 Ribbon Communications Confidential and Proprietary


Ribbon STI-Certification Authority (STI-CA)
Ribbon STI-Certification Authority (STI-CA) in the U.S.

• As an STI-PA approved Certification Authority, Ribbon plays an integral role in the


U.S. governance and certificate management infrastructure in support of caller ID
authentication.

• Ribbon STI-CA performs following functions to maintain the integrity of the SHAKEN
framework:
a) Acceptance of SHAKEN Certificate Signing Requests (CSR) for new certificates
b) Automated validation of Service Provider Code (SPC) Tokens
c) Issuance of standards-compliant SHAKEN signing certificates, including the required
Telephone Number Authorization List extension
d) Revoking certificates if needed and notifying the STI-PA
e) Processing of Certificate Signing Requests to renew certificates before they expire

25 Ribbon Communications Confidential and Proprietary


STI-AS/VS Disaster Recovery Mechanism
Typical STI In-Network Deployment

Database and Database and Database and


App Services App Services App Services

(Primary) (Secondary) (Secondary)

AS/VS AS/VS

27 Ribbon Communications Confidential and Proprietary


Two-Site Scenario: Recovery of a Site With a Majority of Members

(Secondary)
(Primary) (Secondary)

AS/VS
AS/VS

* *

(Secondary  Primary) (New (New


(Primary) (Secondary) Secondary) Secondary)

AS/VS AS/VS

28 Ribbon Communications Confidential and Proprietary


STI Licensing, Sizing, and Deployment
Ribbon STI – Licensing and Pricing Model

• Both perpetual and term licensing models are available


– Network-Wide Domain Locked Licensing only

• Pricing is by tiers, based on Peak Transactions Per Second (TPS)


– Peak TPS is the total number of signing and verification transactions or requests

30 Ribbon Communications Confidential and Proprietary


STI - VM Sizing

STI-AS/VS MONGO DB
Number of VMs 2 3
vCPU for each VM 4 2
vMem for each VM 16G 8G
vHDD for each VM 80G 500G
vNIC for each VM Min - 1 Min - 1
Recommended - 3 Recommended - 2
• STI-AS/VS - 3 vNICs recommended to segregate the traffic between management, signaling
and internet (for CR and fetching certificates)
• MongoDB 2 vNICs are recommended separate management and data traffic

31 Ribbon Communications Confidential and Proprietary


STIR/SHAKEN As a Service
STIR/SHAKEN as a Service

• Complete STIR/SHAKEN solution hosted by Ribbon


• STI-AS
• STI-VS
• SP-KMS
• SKS
• STI-CR
• STI-CA

33 Ribbon Communications Confidential and Proprietary


Ribbon Call TrustTM Services Are Enabled By Ribbon Identity Hub

CNAM
Service National
analytics data
SBC/GSX/3rd Party

STIR/SHAKEN
as a Service
Client
requests &
Policy & Routing responses
Cloud Ribbon
Reputation Identity DB
Scoring MNOC
Call Processing 3rd party policy
Trust
Context
Real-time
Non-real time
Behavioral (potential bad actor) information
Customer
analytics

Network Operators

• Identity Hub is Ribbon’s cloud-native SaaS platform for identity assurance. Runs on AWS
• Flexible ecosystem with open APIs for client requests and 3rd party data integration
34 Ribbon Communications Confidential and Proprietary
In-network STI Deployment Interworking with Ribbon Identity Hub

In Network Ribbon Hosted

STIR/
STI-CR
SHAKEN
STI-CA
2 3 Service

SBC/GSX/3rd
Party 1 3
Session
Control
4 Cloud
Identity DB
Service Graph Reputation
Policy & Routing Scoring

35 Ribbon Communications Confidential and Proprietary


Ribbon’s STIR/SHAKEN as a Service

In Network Ribbon Hosted


CNAM
Service

STIR/
SHAKEN
Service
3
SBC/GSX/3rd Party
1 2
Session
Control
4 Cloud
Identity DB
Service Graph Reputation
Policy & Routing Scoring

36 Ribbon Communications Confidential and Proprietary


Ribbon’s STIR/SHAKEN as a Service + Reputation Scoring

In Network Ribbon Hosted


CNAM
Service

STIR/
SHAKEN
Service
4 3
SBC/GSX/3rd Party
1 2 5
Session 7 6 Cloud
Control Identity DB
Service Graph
Reputation
Policy & Routing Scoring

37 Ribbon Communications Confidential and Proprietary


Summary

 Ribbon’s STI provides STI-AS (Authentication), STI-VS (Verification), STI-CR (certificate repository) and
STI-CA (Certification Authority) for secure management of certificates and digital keys

 Ribbon solutions are standards-compliant implementation of STIR/SHAKEN

 Vendor-agnostic interworking work with 3rd party network elements per ATIS 1000082-compliant REST
interface

 Deploy Ribbon’s STI in a service provider network or purchase Ribbon’s STIR/SHAKEN as a Service

 Ribbon S/SaaS leverages Ribbon Identity Hub, our cloud native SaaS platform, to ensure a scalable,
active-active, geo redundant architecture

 Deploy Ribbon’s STI alongside Ribbon PSX for a complete turnkey solution with flexible origination /
termination policies and robust Call Validation Treatment (CVT)
38 Ribbon Communications Confidential and Proprietary
Ribbon Reputation Scoring Solutions

39 Ribbon Communications Confidential and Proprietary


Three Key Attributes Needed for Identity Assurance

Trust
Identity Reputation
Context

Who is the What have Where did this


making the they done call enter my
call? historically? network?

40 Ribbon Communications Confidential and Proprietary


Caller Identity - Where STIR/SHAKEN Comes Up Short?

With STIR/SHAKEN a calling number is “vouched for” but the


originator’s intent and reputation behind the number is not verified

SIP CallerID
xxx-yyy-zzzz
?

Intent and Reputation allow you to “take


action” to mitigate robocalls and fraud

41 Ribbon Communications Confidential and Proprietary


Determining Identity

Known
Subscribers

Do Not Originate List


NEVER valid
?
Un-Assigned Numbers
Caller Identity
Invalid National
numbers

STIR/SHAKEN

42 Ribbon Communications Confidential and Proprietary


Determining Reputation and Trust Context

Analytics
(anomaly detection)

3rd Party Reputation DBs


Identified bad actors

? Carrier or crowdsourced Reputation


Caller
Known subscriber
Originating interface
Where is this
call entering the Known/roaming Maybe spoofed
network? subscriber
Peering interface
Trust Context
Local number
Peering interface

43 Ribbon Communications Confidential and Proprietary


Identity Assurance Goal - Take Action Before Bad Things Happen

• Use Identity + Reputation + Trust Context to determine “action to take”


to mitigate robocalls and fraud
• Example:
– In-network analytics learns network behavior and identifies normative traffic
models and develops digital fingerprints that establish baselines
– Live traffic is compared to the baseline(s) + use of additional relevant data to
identify anomalies and determine actions to take
– Actions might be a simple log and alert function which will trigger investigations
– Or an action could be more specific and automated to alter how traffic is
handled, such as blocking a suspected call from completing or labeling it
potential spam

Reject; Deflect; Inform

44 Ribbon Communications Confidential and Proprietary


Attributes of an Identity Assurance Solution

+ +
Analytics Digital Fingerprint Open Ecosystem

Cloud native design and web-scale processing


Low latency for per call, real-time inference
Open ecosystem for queries and data integration

45 Ribbon Communications Confidential and Proprietary


Defend in Action 3rd Party 3rd Party
Carrier Identity &
Subscriber Opt-In

(Smartphone) Reputation DB Robo DB Federated Carrier DB


DB

Network level
Call Blocking
Defend Call blocking for
Identification feature phone
Subscriber
Report Spam B/W List users
REST API
Self Care
(Rep Score, CNAM)
AI/ML Speech REST API
Analytics * (Sub List)
2
3
Defend Mobile Allow
(Android, iOS)
Incoming 1 4
Block
call Call Treatment

Voicemail
Rule Based
call treatment

46 Ribbon Communications Confidential and Proprietary


Defend Mobile (Smartphone App)

Spam Call Detection Fraud Call Detection Calling Name

Detect & display the spam / robocall Detect & display the fraud call using Display the caller’s name for
using reputation score reputation score unknown numbers using CNAM

Call Blocking Report Spam Personal List

Automatic call blocking or send to User reporting of the spam caller Maintain personal block and allow
voicemail per user’s choice from the mobile app list in addition to global list

Reverse Lookup Self Care Fraud Analyze*

Find out if the number is spam or Manage other defend application Detect fraud calls using AI/ML
fraud caller by entering digits features from mobile app speech analytics on mobile app

47 Ribbon Communications Confidential and Proprietary


Fraud Score based Identification

● Fraud score computation by Identity hub


● Defend Mobile rules for caller identification
based on the fraud score
● Different warning level to the user
● Example rules
○ Fraud score > 0.4 => “Potential Fraud”
○ Fraud score > 0.7 => “Fraud Caller”
● Rules configuration based on service provider

Score > 0.4

Score > 0.7

48 Ribbon Communications Confidential and Proprietary


Spam Score based Identification

● Spam score computation by Identity hub


● Defend Mobile rules for caller identification
based on the Spam score
● Different warning level to the user
● Example rules
○ Spam score > 0.4 => “Potential Spam”
○ Spam score > 0.7 => “Spam Caller”
● Rules configuration based on service provider

Score > 0.4

Score > 0.7

49 Ribbon Communications Confidential and Proprietary


Customizable to Suit Your Needs

● User friendly and easy to use interface


● Customizable for provider features and needs
● White labeling of the mobile app as per the
service provider’s look & feel
● Framework to plug-in other defend applications
e.g. Robocall blocker, Fraud analyze etc.
● Works on Android and iOS devices

50 Ribbon Communications Confidential and Proprietary


Defend in Action 3rd Party 3rd Party
Carrier Identity &
Subscriber Opt-In Federated Carrier DB

(Feature Phone)
Reputation DB Robo DB DB

(Whisper)
Receiving call
from potential
spam Number
2

Allow
Defend Block 4
1
Subscriber
B/W List Voicemail

Whisper
Network level Call
blocking or whisper for
Rule Based
feature phone users call treatment

51 Ribbon Communications Confidential and Proprietary


Defend Number Block (Server)

Block List Allow List Network Blocking

Allow subscribers to manage their Allow subscribers to manage their Network level allow/block per
own personal block list own personal allow list subscriber without ringing phone

Feature phone Web Self Care IVR Self Care


Enable feature phone to filter calls
Manage personal block & allow list Manage personal block & allow list
based on rep score & personal list,
from web portal from IVR interface
call whisper warning

Defend + Multi-network On-prem/Cloud

Framework to add other defend Support for multi-network call Virtualized deployment in on-prem
applications handling (Legacy, IMS, NGN) or public cloud

52 Ribbon Communications Confidential and Proprietary


Ribbon VoLTE Monitoring Solutions

53 Ribbon Communications Confidential and Proprietary


Ribbon VoLTE / VoWiFi Service Assurance

VoLTE / VoWiFi Network Performance Key Problems Solved


• National, Regional & Sub-regional Levels with multi- • Identify and diagnose VoLTE problems such
cluster support as Failed Registrations, Failed Calls, Signaling
Delays, Call Quality, One-way Calls, Call
• Multi-dimensional analysis across Device, Gateway,
Drops, Media Gaps, etc.
APN, CSCF, Location, Signaling, etc.
• Identify subscribers impacted by a problem
• Cross-correlate between domains (RAN, EPC, IMS)
• Analyze problem end-to-end with built-in KPIs
& aggregations, dashboards, data browser and
ladder diagrams
• Automate business logic through custom
workflows, alarming, dashboards and next
best actions

54 Ribbon Communications Confidential and Proprietary


Quality of Experience (QoE) Metrics

“I can’t seem to make a call” Call Initiation Rate (%)


• High failure rates = Call Attempt Abandonment
Accessibility Call Setup Time (s)
“It takes a long time for the
call to connect” • Long setup times = Call Attempt Abandonment

Call Drop (%)


“The call keeps dropping” Retainability • High Drop rates = Unsustainable &/or Inconsistent call continuity
(Call Abandonment)

“The voice quality is poor” Mean Opinion Score (MOS)


• Consistently low scores = poor speech quality, User Dissatisfaction
& Call Abandonment

“I keep hearing voice Integrity Packet Drop (%)


overlap” • High Drop rates lead to Degraded Voice Quality

“There are silent periods or Media Gap (%)


mutes in the media” • Large gaps in media download/upload causing voice quality issues

55 Ribbon Communications Confidential and Proprietary 55


VoLTE & VoWiFi Solution

VoLTE / VoWiFi Service Assurance


• Central monitoring and analysis ideal for trouble
shooting and planning from subscriber to region AS
Sh

Data Capture Engine (DCE) HSS MGCF


• Distributed tapping balances scale, performance
and management Cx
I/S-CSCF
DCE PCRF
Interface Support
• Access – 2 (S1-MME, S1-U) MSC Rx Mw
MRF
• Packet Core – 4 (S11, S5/S8, Sv, S2a/b), Gx
P-CSCF
8 (Diameter) Sv MGW

S1-MME
MME
S11

LTE eNodeB
SGW PGW
S1-U (Gm/RTP)

S2a/S2b
TWAG/
WiFi AP WLC
ePDG SWm

RAN Packet Core IMS Internet


56 Ribbon Communications Confidential and Proprietary
Ribbon IMS Service Assurance

IMS Network Performance Key Problems Solved


• National, Regional & Sub-regional Levels with multi- • Identify and diagnose IMS problems such as
cluster support Failed Registrations, Failed Calls, Signaling
Delays, Call Quality, One-way Calls, Call
• Multi-dimensional analysis across IMSI, APN,
Drops, etc.
Network Functions, Signaling, etc.
• Identify subscribers impacted by a problem
• Cross-correlate with other domains (RAN, EPC)
• Analyze problem end-to-end with built-in KPIs
& aggregations, dashboards, data browser and
ladder diagrams
• Automate business logic through custom
workflows, alarming, dashboards and next
best actions

57 Ribbon Communications Confidential and Proprietary


IMS Solution

IMS Service Assurance Mr’


• Central monitoring and analysis ideal for trouble
shooting and planning from subscriber to region AS BGCF
Sh Mi Mj
Data Capture Engine (DCE) HSS MGCF
Mg
• Distributed tapping balances scale, performance ISC
and management Cx
I/S-CSCF
DCE PCRF Mr
Interface Support
Mw
• IMS Core – 4 (RTP), 9 (SIP) Rx Mw
MRF
Mx
MSC Gx
P-CSCF
MGW
Sv
S1-MME Ici/Izi
IBCF
MME
S11 TRGW

LTE eNodeB
SGW PGW
S1-U (Gm/RTP)
SWx

S2a/S2b
TWAG/
WiFi AP WLC AAA
ePDG SWm

RAN Packet Core IMS Internet


58 Ribbon Communications Confidential and Proprietary
Ribbon Analytics Evolution for 5G
1
5G NSA
8K
Enhanced Mobile • 5G Network Assurance &
Broadband Customer Experience
Tablets/ Fast Gigabit Fast Content • 5G Protocol support for NR
VR/AR (DCE), Option 3x
Smart Phones Internet Experience

2
Edge Compute
Massive Machine • Edge Analytics in MEC
• Security & Protection
Type Comm. • Traffic Management &
Massive IOT Smart City Smart Home E - Health Policy Control

3
Ultra Low Latency 5G SA
• 5GC NWDAF exposure
Applications • 5GC NEF source data
Industrial 4.0 Autonomous Robotics integration
Vehicle
Source: GSMA, ITU

59 Ribbon Communications Confidential and Proprietary


Network Analytics Insights – 4G and 5G NSA

• Provides Visibility of Mobile Network Performance Key Problems Solved


across all markets, and data centers
• Identify and diagnose mobile problems such as
• Analyze performance based on Device, Gateway, Session Setup Failures, Signaling Delays,
APN, Location and Signaling Events Session/App Quality, etc.
• Software Solution Providing Non-Intrusive Vendor • Identify subscribers impacted by Network
Agnostic Monitoring & Actionable Subscriber
Problems
Analytics
• Provide visibility of Heavy Users and Each
Subscriber’s Call Sessions and their Experience
• Tracking different subscriber sessions across 3G,
LTE and 5G, as well as inter-RAT scenarios
• Seamlessly analyze between user plane and
control plane
• Proactive problem analysis with Alarms, Reports,
and Ladder diagrams

60 Ribbon Communications Confidential and Proprietary


Ribbon Analytics: Multi-Access Edge Compute Solution

• MEC Analytics – Expose standardized ETSI MEC APIs


• RAN, Location, WLAN
MEC Applications • Across access technologies
• Platform Analytics
• SLA and Security Analytics (MEC platform only)
Services (ex: • Extended Analytics – Historical or network-wide view
Analytics,….) • CEM/SA, Marketing/Monetization, and Security
Insights
• Real-time Analytics – Descriptive and predictive insights
• Scoring sector, backhaul, subscribers, apps over
mobility, utilization, and QoE
MEC Platform • Classifying traffic or feeds (content, application,
threats, and fraud)

Ribbon’s Multi-Access Edge Computing (MEC) solution combines several


Services such as Analytics with a full MEC platform to deliver MEC
functionality for service providers
61 Ribbon Communications Confidential and Proprietary
5G SA – 3GPP 5GC Architecture for Analytics: NWDAF

3GPP NWDAF goal to provide Data Repositories


…while allowing for different
standardized interfaces to data NWDAFs to co-exist within 5GC
from NFs/AFs and analytics with specializations per analytics
insights to NFs/AFs function
Data
Access

NF NF
Delivery of
NF Delivery of NF
analytics NF
NF activity
NWDAF data NF
NF data and
NF local analytics NF

AF AF

OAM
source 3GPP TR 23.791

62 Ribbon Communications Confidential and Proprietary


Thank You

You might also like