Enabling Application-Centric Mobile Networks

Enabling accurate application identification requires technology with the intelligence to do more than just a high level view of the data packets traversing the network. Deep packet inspection (DPI) provides that visibility by analyzing up to Layer 7 of the packet, providing finer control and more granular application identification than when classification is based only on header information. This requires maintaining a software library of protocols and applications and understanding patterns and behaviors for every new app and version, otherwise a packet can easily be incorrectly classified. DPI can also extract metadata and application attributes from the network traffic to determine application performance and quality of service for VoIP and video, as well as to protect against network security threats.

End of Unlimited Data Plans

The huge number of smartphones in the market and the increase in mobile data demand is putting a strain on networks. Smart policy control and charing solutions become an investment to keep up with the mobile data explosion.

White Paper Smart Traffic Management, Policy Control and Charging in Converging IP Network

The reasons for network operators to deploy a smart policy control and charging solution in their network are as manifold as the operators are different in their strategy, market position and size. It ranges from the up-and-coming mobile network operator that wants to set itself apart from the well-established competition with progressive and creative charging models and value-added ser- vices to the global player that wants to monetize OTT traffic and use network capacity as efficiently as possible to deliver the best quality of experience to its customers. This white paper describes how a flexible and scalable policy enforcement system within a policy control and charging solution can enable a great variety of scenarios with a set of key network functions that is comparably small but powerful.

Bandwidth Management Solutions for Network Operators

Bandwidth management using deep packet inspection (DPI) is a relatively new field for network operators. This white paper uses a challenge solution approach to explain how this technology can help solve many of the issues that arise from growing user numbers generating ever more traffic with a large variety of new applications. The challenges are illustrated with real-world numbers taken from ipoque's Internet Study 2007. A selection of possible solutions helps network operators pick the most appropriate ones based on their specific requirements.

Copyright Protection in the Internet

During the last few years, file sharing of copyright-protected material, particularly in peer-to-peer (P2P) networks, has been a serious threat to the established business models of the content industry. There have been numerous discussions about possible countermeasures, some of which have already been implemented. This white paper aims to provide an as objective as possible assessment of the countermeasures for P2P from the perspective of a network device vendor with particular experience with Internet traffic management solutions.

Deep Packet Inspection – Technology, Applications and Net Neutrality

Deep packet inspection has been subject to controversial debates about network neutrality and online privacy for the last few years. In this white paper we will argue that DPI in itself is a neutral technology, and its affect on the Internet and our society will be determined by its utilization.This paper focuses on Internet bandwidth management based on DPI. Interestingly, the technology has been around in other applications such as firewalls and virus scanners for much longer without sparking similar controversy. After a simple technical explanation of what DPI is – and what it is not –, we will dispell some myths and untruths. Future discussions, particularly in the area of bandwidth management, should not focus on DPI as a technology, but on its specific applications. To facilitate these discussions, we will propose a simple system of categories that classify different Internet traffic management schemes according to their impact on net neutrality, market competition and online privacy.