SlideShare a Scribd company logo
1 of 29
Download to read offline
/
...
Using Rule Engines
in Telco
June 2016
/
...
Contents
1. Why so many change requests?
2. Vendor’s “standard” way of handling configurability / flexibility
3. A new approach: Rules Engines
4. Rules Engines in telco: References
/
...
Why So Many Change Requests?
01
/
...
acceptance
&
go live
cost
evaluation
Initial
Business Need
building
selection
department
requirements
and
approval
/
...
approval
acceptance
&
go live
Updates on the
Business Needs
time and
cost
estimationrequirements
to the Vendor
evaluation
building
/
...
Flexibility vs Cost vs Ease of Use
/
...
Vendor’s “standard” way of handling
configurability / flexibility
02
/
...
Configurable Product
XML-Based
/
...
Configurable Product
Proprietary Rules Structure
/
...
Configurable Product
Decision Tree
/
...
Configurable Product – Flexibility
What Is the Problem?
> Flexible products have one thing in common: the proprietary means of
configuration (file based or GUI) which often leads to vendor being asked to
make configuration changes.
/
...
A New Approach
Rules Engines
03
/
...
Why Rules Engines?
> Designed specifically for processing rules:
• Extremely fast
• Very flexible
> Available for many years, hence reliable:
• CLIPS
• DROOLS
> Open products:
• There is a community around them
• Easy integration on all popular programming languages (Java, C/C++/C#, PHP)
• Not vendor specific
/
...
How Can Rules Engines Help?
> Design the application to “Externalize” the decision making process by
using a Rules Engine and defining the Business Logic in the rules definition
> ALL available information must be passed to the rules engine (even if some
information is not currently needed)
Decode
message
Context Data
Management
Application
Business Logic
Encode
message
Rules Engine
Rules Files
Incoming
Message
Outgoing
Message
Simplified version of a
Rules Engine integration
Data 1
Data 1
Context Data for current
message = Data 2
Data 1
and
Data 2
Data 1
and
Data 2
Data 3
Business Decision
(not just one field)
/
...
Rules Engines in Telco
Reference 1: SMS Router
04
/
...
SMS Router
What the Customer Wanted
> The customer wanted a system which:
• Can accept connections from multiple service providers
• Is able to route SMSes to right Service Provider based on the destination
number
• Charges the subscriber based on the destination Short Code of the SMS
• Restricts access to certain Short Codes for prepaid subscribers
> An SPR (Subscriber Profile Repository) could be queried based on
MSISDN to retrieve information about the customer:
1. Prepaid/Postpaid
2. Corporate Customer / Private Subscriber
3. Customer address (only for postpaid subscribers)
/
...
SMS Router
The Proposed Solution
SMPP
Decoder
SPR Adapter
SMS Router
Logic
SMPP
Encoder
Rules Engine
Rules Files
SMSC
Subscriber
Profile
Repository
SP 1
SP n
Convergent
Billing System
.
.
.
.
SMPP
Get Subscriber
Info
Subscriber
Info
SMS Information
SPR Information
Selected Serv. Prov.
Billing Info
/
...
SMS Router
The Rules
> ALL available information from SMPP (the SMS) and from SPR
(customer info) is passed to the rules engine
• SMPP: Originator Address, Destination Address, Encoding Language,
SMS Text, …
• SPR: Pre or Postpaid, Corporate or Individual, Address
Rules Engine:
Drools – Table Based
/
...
SMS Router
The Change Request
The customer’s initial request
> A system which:
• Can accept connections from
multiple service providers
• Is able to route SMSes to the right
Service Provider based on the
destination number
• Charges the subscriber based on
the destination Short Code of the
SMS
• Restricts access to certain Short
Codes for prepaid subscribers
Later requests
> Share a short code between
different Service Providers based on
the first word of the SMS text
> Restrict the access of corporate
subscribers to certain short codes
/
...
SMS Router
The Change Request Simple Solution
> Taking advantage of the information passed to the rules engine was not
restricted to the initial need
> The new functionality was implemented by only updating the rules
• SMPP: Originator Address, Destination Address, Encoding Language, SMS Text,
…
• SPR: Pre or Postpaid, Corporate or Private, Address
/
...
Rules Engines in Telco
Reference 2: SS7 Firewall
05
/
...
SS7 Firewall
What the Customer Wanted
> The customer wanted a system which:
• Intercepts incoming traffic from SS7 interconnect partners;
• Allows legitimate traffic to go through and rejects malicious messages (as
specified by GSMA IR.82);
• Allows detection of new type of attacks, not known at RFP date;
• Does not restrict them in setting up commercial agreements with partners
(e.g. MVNOs);
• Is able to handle 10,000 TPS;
/
...
SS7 Firewall
The solution
SS7 Firewall
MAP REQUEST
 CgPA
 CdPA
 [MAP Parameters]
In-memory
data store
Rule engine
 Get
context data
 Determine treatment
 of current request
Action
> Rules Engine decides if a message is a valid one or an attack;
> The Rules Engine receives information from:
1. The incoming message from SCCP, TCAP and MAP layers;
2. The context of the message (for sessions);
3. External sources of information (HLR which provides the real subscriber
location)
/
...
SS7 Firewall
Rules examples
Handling of ISD (Insert Subscriber
Data) according to GSMA IR.82 ->
reject all incoming traffic for own
IMSI ranges.
; IF (OpCode=ISD AND IMSI=22610*) THEN
Reject+Alarm
(defrule rule-for-prod-2p
(ParamInMAP (opCode "7"))
(ParamInMAP (IMSI “22610*"))
=>
(reset)
(assert (ParamOut (action 3)
(sendAlarm 1) (alarmAdditionalInfo "Reject:
ISD and within own IMSIs range"))))
The customer wanted to have an MVNO
using interconnect links which should be
considered as “own network”.
By passing all available info to the rules
engine, this requirement is solved with a
simple rule modification.
(defrule rule-for-prod-2p
(ParamInMAP (opCode "7"))
(ParamInMAP (IMSI “22610*"))
(not (ParamInSCCP (CgPA “4012234567890")))
=>
(reset)
(assert (ParamOut (action 3) (sendAlarm 1)
(alarmAdditionalInfo "Reject: ISD and within own
IMSIs range"))))
/
...
Rules Engines in Telco
Reference 3: Real-Time Antifraud System
06
/
...
Real-Time Antifraud System
What the Customer Wanted
SYSTEM
Identify
potential
frauds on the
voice calls
Easy
modification
of the
parameters
involved in
fraud
detection
Add new
scenarios
Multiple
operators in
the group
/
...
Real-Time Antifraud System
Architecture
/
...
Real-Time Antifraud System
The Rules
/
...
/
Thank
you!
contact@computaris.com
[+44]20.7193.9189
www.computaris.com
/
Software is
in the details
/
razvan.rusu@computaris.com

More Related Content

What's hot

Spring Security
Spring SecuritySpring Security
Spring SecurityBoy Tech
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxTriLe786508
 
GraalVM Native Images by Oleg Selajev @shelajev
GraalVM Native Images by Oleg Selajev @shelajevGraalVM Native Images by Oleg Selajev @shelajev
GraalVM Native Images by Oleg Selajev @shelajevOracle Developers
 
Why Katalon Studio?
Why Katalon Studio?Why Katalon Studio?
Why Katalon Studio?Knoldus Inc.
 
Push Notification for Android, iOS & Sever Side Using Firebase Cloud Messaging
Push Notification for Android, iOS & Sever Side Using Firebase Cloud MessagingPush Notification for Android, iOS & Sever Side Using Firebase Cloud Messaging
Push Notification for Android, iOS & Sever Side Using Firebase Cloud MessagingCumulations Technologies
 
Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
Loom Virtual Threads in the JDK 19
Loom Virtual Threads in the JDK 19Loom Virtual Threads in the JDK 19
Loom Virtual Threads in the JDK 19José Paumard
 
Think2018 2314-Microservices and BPM-can they coexist?
Think2018 2314-Microservices and BPM-can they coexist?Think2018 2314-Microservices and BPM-can they coexist?
Think2018 2314-Microservices and BPM-can they coexist?Brian Petrini
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Cloudera, Inc.
 
Spring Framework
Spring Framework  Spring Framework
Spring Framework tola99
 
Introducing BDD and TDD with Cucumber
Introducing BDD and TDD with CucumberIntroducing BDD and TDD with Cucumber
Introducing BDD and TDD with CucumberKnoldus Inc.
 
Introducción a java EE 7
Introducción a java EE 7Introducción a java EE 7
Introducción a java EE 7Carlos Camacho
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access ControlEmpowerID
 

What's hot (20)

Spring Security
Spring SecuritySpring Security
Spring Security
 
Automation Testing
Automation TestingAutomation Testing
Automation Testing
 
Api testing
Api testingApi testing
Api testing
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptx
 
Spring Security 5
Spring Security 5Spring Security 5
Spring Security 5
 
GraalVM Native Images by Oleg Selajev @shelajev
GraalVM Native Images by Oleg Selajev @shelajevGraalVM Native Images by Oleg Selajev @shelajev
GraalVM Native Images by Oleg Selajev @shelajev
 
Why Katalon Studio?
Why Katalon Studio?Why Katalon Studio?
Why Katalon Studio?
 
Drools Ecosystem
Drools EcosystemDrools Ecosystem
Drools Ecosystem
 
Push Notification for Android, iOS & Sever Side Using Firebase Cloud Messaging
Push Notification for Android, iOS & Sever Side Using Firebase Cloud MessagingPush Notification for Android, iOS & Sever Side Using Firebase Cloud Messaging
Push Notification for Android, iOS & Sever Side Using Firebase Cloud Messaging
 
Android Security
Android SecurityAndroid Security
Android Security
 
Loom Virtual Threads in the JDK 19
Loom Virtual Threads in the JDK 19Loom Virtual Threads in the JDK 19
Loom Virtual Threads in the JDK 19
 
Think2018 2314-Microservices and BPM-can they coexist?
Think2018 2314-Microservices and BPM-can they coexist?Think2018 2314-Microservices and BPM-can they coexist?
Think2018 2314-Microservices and BPM-can they coexist?
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

 
Spring Framework
Spring Framework  Spring Framework
Spring Framework
 
Introducing BDD and TDD with Cucumber
Introducing BDD and TDD with CucumberIntroducing BDD and TDD with Cucumber
Introducing BDD and TDD with Cucumber
 
SQLite database in android
SQLite database in androidSQLite database in android
SQLite database in android
 
Introducción a java EE 7
Introducción a java EE 7Introducción a java EE 7
Introducción a java EE 7
 
Log4j in 8 slides
Log4j in 8 slidesLog4j in 8 slides
Log4j in 8 slides
 
Design pattern
Design patternDesign pattern
Design pattern
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
 

Viewers also liked

A comparison of UIA/Rules Business Rules and LucidWorks Drools
A comparison of UIA/Rules Business Rules and LucidWorks DroolsA comparison of UIA/Rules Business Rules and LucidWorks Drools
A comparison of UIA/Rules Business Rules and LucidWorks DroolsPeter Arwanitis
 
JBoss Drools - Pure Java Rule Engine
JBoss Drools - Pure Java Rule EngineJBoss Drools - Pure Java Rule Engine
JBoss Drools - Pure Java Rule EngineAnil Allewar
 
Hybrid rule engines (rulesfest 2010)
Hybrid rule engines (rulesfest 2010)Hybrid rule engines (rulesfest 2010)
Hybrid rule engines (rulesfest 2010)Geoffrey De Smet
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing BasicsShilpin Pvt. Ltd.
 
Drools Happenings 7.0 - Devnation 2016
Drools Happenings 7.0 - Devnation 2016Drools Happenings 7.0 - Devnation 2016
Drools Happenings 7.0 - Devnation 2016Mark Proctor
 
WASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionWASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionIshmael Yamson
 
Rule Engine Evaluation for Complex Event Processing
Rule Engine Evaluation for Complex Event ProcessingRule Engine Evaluation for Complex Event Processing
Rule Engine Evaluation for Complex Event ProcessingChandra Divi
 
Innovations in telecom
Innovations in telecomInnovations in telecom
Innovations in telecomYulia Myronova
 
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016ManageIQ
 
Java Performance and Profiling
Java Performance and ProfilingJava Performance and Profiling
Java Performance and ProfilingWSO2
 
What Can You Do With Twilio
What Can You Do With TwilioWhat Can You Do With Twilio
What Can You Do With TwilioTwilio Inc
 
Rule Engine & Drools
Rule Engine & DroolsRule Engine & Drools
Rule Engine & DroolsSandip Jadhav
 
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at UberWSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at UberWSO2
 
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTE
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTEJBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTE
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTEtsurdilovic
 

Viewers also liked (18)

A comparison of UIA/Rules Business Rules and LucidWorks Drools
A comparison of UIA/Rules Business Rules and LucidWorks DroolsA comparison of UIA/Rules Business Rules and LucidWorks Drools
A comparison of UIA/Rules Business Rules and LucidWorks Drools
 
JBoss Drools - Pure Java Rule Engine
JBoss Drools - Pure Java Rule EngineJBoss Drools - Pure Java Rule Engine
JBoss Drools - Pure Java Rule Engine
 
Hybrid rule engines (rulesfest 2010)
Hybrid rule engines (rulesfest 2010)Hybrid rule engines (rulesfest 2010)
Hybrid rule engines (rulesfest 2010)
 
Rules engine
Rules engineRules engine
Rules engine
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing Basics
 
Drools Happenings 7.0 - Devnation 2016
Drools Happenings 7.0 - Devnation 2016Drools Happenings 7.0 - Devnation 2016
Drools Happenings 7.0 - Devnation 2016
 
WASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionWASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final Version
 
Drools Workshop @JBCNCONF 2016
Drools Workshop @JBCNCONF 2016Drools Workshop @JBCNCONF 2016
Drools Workshop @JBCNCONF 2016
 
Rule Engine Evaluation for Complex Event Processing
Rule Engine Evaluation for Complex Event ProcessingRule Engine Evaluation for Complex Event Processing
Rule Engine Evaluation for Complex Event Processing
 
Innovations in telecom
Innovations in telecomInnovations in telecom
Innovations in telecom
 
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016
OpenNMS - Jeff Gehlbach - ManageIQ Design Summit 2016
 
Final ppt
Final pptFinal ppt
Final ppt
 
S Curve
S CurveS Curve
S Curve
 
Java Performance and Profiling
Java Performance and ProfilingJava Performance and Profiling
Java Performance and Profiling
 
What Can You Do With Twilio
What Can You Do With TwilioWhat Can You Do With Twilio
What Can You Do With Twilio
 
Rule Engine & Drools
Rule Engine & DroolsRule Engine & Drools
Rule Engine & Drools
 
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at UberWSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
WSO2Con USA 2017: Scalable Real-time Complex Event Processing at Uber
 
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTE
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTEJBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTE
JBoss Drools and Drools Fusion (CEP): Making Business Rules react to RTE
 

Similar to The benefits of using the rules engine paradigm in telco systems

Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSInam Khosa
 
Interconnection form in the SMS business - explained
Interconnection form in the SMS business - explainedInterconnection form in the SMS business - explained
Interconnection form in the SMS business - explainedDaniela Jovic
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical ArchitectureVishad Garg
 
MQQT nd COAP.pptx
MQQT nd COAP.pptxMQQT nd COAP.pptx
MQQT nd COAP.pptxRajkk5
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comAnne Kwong
 
Processing IoT Data with Apache Kafka
Processing IoT Data with Apache KafkaProcessing IoT Data with Apache Kafka
Processing IoT Data with Apache KafkaMatthew Howlett
 
MyTelecomBroker Value Proposition
MyTelecomBroker Value PropositionMyTelecomBroker Value Proposition
MyTelecomBroker Value PropositionMyTelecomBroker
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsProdapt Solutions
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterJuniper Networks
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 

Similar to The benefits of using the rules engine paradigm in telco systems (20)

Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMS
 
CNaaS service definition
CNaaS service definitionCNaaS service definition
CNaaS service definition
 
MQTT and CoAP
MQTT and CoAPMQTT and CoAP
MQTT and CoAP
 
Interconnection form in the SMS business - explained
Interconnection form in the SMS business - explainedInterconnection form in the SMS business - explained
Interconnection form in the SMS business - explained
 
SCE 2
SCE 2SCE 2
SCE 2
 
SCE 3
SCE 3SCE 3
SCE 3
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical Architecture
 
MQQT nd COAP.pptx
MQQT nd COAP.pptxMQQT nd COAP.pptx
MQQT nd COAP.pptx
 
SOMEIP-protocol.pptx
SOMEIP-protocol.pptxSOMEIP-protocol.pptx
SOMEIP-protocol.pptx
 
Cap interface
Cap interfaceCap interface
Cap interface
 
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
Processing IoT Data with Apache Kafka
Processing IoT Data with Apache KafkaProcessing IoT Data with Apache Kafka
Processing IoT Data with Apache Kafka
 
Kafka/SMM Crash Course
Kafka/SMM Crash CourseKafka/SMM Crash Course
Kafka/SMM Crash Course
 
MyTelecomBroker Value Proposition
MyTelecomBroker Value PropositionMyTelecomBroker Value Proposition
MyTelecomBroker Value Proposition
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice Solutions
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data Center
 
Diameter_Apr2014.pptx
Diameter_Apr2014.pptxDiameter_Apr2014.pptx
Diameter_Apr2014.pptx
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 

More from Computaris

70% less troubleshooting time and reduced network operation costs
70% less troubleshooting time and reduced network operation costs70% less troubleshooting time and reduced network operation costs
70% less troubleshooting time and reduced network operation costsComputaris
 
DevOps and 5G cloud native solutions supported by Computaris automated testin...
DevOps and 5G cloud native solutions supported by Computaris automated testin...DevOps and 5G cloud native solutions supported by Computaris automated testin...
DevOps and 5G cloud native solutions supported by Computaris automated testin...Computaris
 
Complex cloudification: Porting bare metal apps to telco cloud vnf
Complex cloudification: Porting bare metal apps to telco cloud vnfComplex cloudification: Porting bare metal apps to telco cloud vnf
Complex cloudification: Porting bare metal apps to telco cloud vnfComputaris
 
Solid combination of Diameter and Computaris plugins in automated testing tool
Solid combination of Diameter and Computaris plugins in automated testing toolSolid combination of Diameter and Computaris plugins in automated testing tool
Solid combination of Diameter and Computaris plugins in automated testing toolComputaris
 
First development of Cr interface for MRF equipment by Computaris
First development of Cr interface for MRF equipment by ComputarisFirst development of Cr interface for MRF equipment by Computaris
First development of Cr interface for MRF equipment by ComputarisComputaris
 
Swisscom’s prepaid billing system: A case of successful project and solid par...
Swisscom’s prepaid billing system: A case of successful project and solid par...Swisscom’s prepaid billing system: A case of successful project and solid par...
Swisscom’s prepaid billing system: A case of successful project and solid par...Computaris
 
Automated testing in migration to 5G network and the cloud
Automated testing in migration to 5G network and the cloudAutomated testing in migration to 5G network and the cloud
Automated testing in migration to 5G network and the cloudComputaris
 
Digital value in telecom and beyond
Digital value in telecom and beyondDigital value in telecom and beyond
Digital value in telecom and beyondComputaris
 
Computaris presentation
Computaris presentationComputaris presentation
Computaris presentationComputaris
 
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...Computaris
 
Computaris cloud and DevOps services
Computaris cloud and DevOps servicesComputaris cloud and DevOps services
Computaris cloud and DevOps servicesComputaris
 
TOP Testing Suite
TOP Testing SuiteTOP Testing Suite
TOP Testing SuiteComputaris
 
Mobile application development
Mobile application developmentMobile application development
Mobile application developmentComputaris
 
Innovative analytics solution for large datacenter network traffic
Innovative analytics solution for large datacenter network trafficInnovative analytics solution for large datacenter network traffic
Innovative analytics solution for large datacenter network trafficComputaris
 
Romanian software market statistics and forecast
Romanian software market statistics and forecastRomanian software market statistics and forecast
Romanian software market statistics and forecastComputaris
 
Computaris DevOps technology expertise
Computaris DevOps technology expertiseComputaris DevOps technology expertise
Computaris DevOps technology expertiseComputaris
 
Computaris builds analytics solution for large datacenter network traffic
Computaris builds analytics solution for large datacenter network trafficComputaris builds analytics solution for large datacenter network traffic
Computaris builds analytics solution for large datacenter network trafficComputaris
 
Romania's success in software outsourcing
Romania's success in software outsourcingRomania's success in software outsourcing
Romania's success in software outsourcingComputaris
 
Computaris cloud expertise
Computaris cloud expertiseComputaris cloud expertise
Computaris cloud expertiseComputaris
 

More from Computaris (20)

70% less troubleshooting time and reduced network operation costs
70% less troubleshooting time and reduced network operation costs70% less troubleshooting time and reduced network operation costs
70% less troubleshooting time and reduced network operation costs
 
DevOps and 5G cloud native solutions supported by Computaris automated testin...
DevOps and 5G cloud native solutions supported by Computaris automated testin...DevOps and 5G cloud native solutions supported by Computaris automated testin...
DevOps and 5G cloud native solutions supported by Computaris automated testin...
 
Complex cloudification: Porting bare metal apps to telco cloud vnf
Complex cloudification: Porting bare metal apps to telco cloud vnfComplex cloudification: Porting bare metal apps to telco cloud vnf
Complex cloudification: Porting bare metal apps to telco cloud vnf
 
Solid combination of Diameter and Computaris plugins in automated testing tool
Solid combination of Diameter and Computaris plugins in automated testing toolSolid combination of Diameter and Computaris plugins in automated testing tool
Solid combination of Diameter and Computaris plugins in automated testing tool
 
First development of Cr interface for MRF equipment by Computaris
First development of Cr interface for MRF equipment by ComputarisFirst development of Cr interface for MRF equipment by Computaris
First development of Cr interface for MRF equipment by Computaris
 
Swisscom’s prepaid billing system: A case of successful project and solid par...
Swisscom’s prepaid billing system: A case of successful project and solid par...Swisscom’s prepaid billing system: A case of successful project and solid par...
Swisscom’s prepaid billing system: A case of successful project and solid par...
 
Automated testing in migration to 5G network and the cloud
Automated testing in migration to 5G network and the cloudAutomated testing in migration to 5G network and the cloud
Automated testing in migration to 5G network and the cloud
 
Digital value in telecom and beyond
Digital value in telecom and beyondDigital value in telecom and beyond
Digital value in telecom and beyond
 
Computaris presentation
Computaris presentationComputaris presentation
Computaris presentation
 
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...
VoLTE implementation for Magenta Telekom awarded "best network in Austria" in...
 
Computaris cloud and DevOps services
Computaris cloud and DevOps servicesComputaris cloud and DevOps services
Computaris cloud and DevOps services
 
TOP Testing Suite
TOP Testing SuiteTOP Testing Suite
TOP Testing Suite
 
IoT STARTER
IoT STARTERIoT STARTER
IoT STARTER
 
Mobile application development
Mobile application developmentMobile application development
Mobile application development
 
Innovative analytics solution for large datacenter network traffic
Innovative analytics solution for large datacenter network trafficInnovative analytics solution for large datacenter network traffic
Innovative analytics solution for large datacenter network traffic
 
Romanian software market statistics and forecast
Romanian software market statistics and forecastRomanian software market statistics and forecast
Romanian software market statistics and forecast
 
Computaris DevOps technology expertise
Computaris DevOps technology expertiseComputaris DevOps technology expertise
Computaris DevOps technology expertise
 
Computaris builds analytics solution for large datacenter network traffic
Computaris builds analytics solution for large datacenter network trafficComputaris builds analytics solution for large datacenter network traffic
Computaris builds analytics solution for large datacenter network traffic
 
Romania's success in software outsourcing
Romania's success in software outsourcingRomania's success in software outsourcing
Romania's success in software outsourcing
 
Computaris cloud expertise
Computaris cloud expertiseComputaris cloud expertise
Computaris cloud expertise
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

The benefits of using the rules engine paradigm in telco systems

  • 1. / ... Using Rule Engines in Telco June 2016
  • 2. / ... Contents 1. Why so many change requests? 2. Vendor’s “standard” way of handling configurability / flexibility 3. A new approach: Rules Engines 4. Rules Engines in telco: References
  • 3. / ... Why So Many Change Requests? 01
  • 5. / ... approval acceptance & go live Updates on the Business Needs time and cost estimationrequirements to the Vendor evaluation building
  • 6. / ... Flexibility vs Cost vs Ease of Use
  • 7. / ... Vendor’s “standard” way of handling configurability / flexibility 02
  • 11. / ... Configurable Product – Flexibility What Is the Problem? > Flexible products have one thing in common: the proprietary means of configuration (file based or GUI) which often leads to vendor being asked to make configuration changes.
  • 13. / ... Why Rules Engines? > Designed specifically for processing rules: • Extremely fast • Very flexible > Available for many years, hence reliable: • CLIPS • DROOLS > Open products: • There is a community around them • Easy integration on all popular programming languages (Java, C/C++/C#, PHP) • Not vendor specific
  • 14. / ... How Can Rules Engines Help? > Design the application to “Externalize” the decision making process by using a Rules Engine and defining the Business Logic in the rules definition > ALL available information must be passed to the rules engine (even if some information is not currently needed) Decode message Context Data Management Application Business Logic Encode message Rules Engine Rules Files Incoming Message Outgoing Message Simplified version of a Rules Engine integration Data 1 Data 1 Context Data for current message = Data 2 Data 1 and Data 2 Data 1 and Data 2 Data 3 Business Decision (not just one field)
  • 15. / ... Rules Engines in Telco Reference 1: SMS Router 04
  • 16. / ... SMS Router What the Customer Wanted > The customer wanted a system which: • Can accept connections from multiple service providers • Is able to route SMSes to right Service Provider based on the destination number • Charges the subscriber based on the destination Short Code of the SMS • Restricts access to certain Short Codes for prepaid subscribers > An SPR (Subscriber Profile Repository) could be queried based on MSISDN to retrieve information about the customer: 1. Prepaid/Postpaid 2. Corporate Customer / Private Subscriber 3. Customer address (only for postpaid subscribers)
  • 17. / ... SMS Router The Proposed Solution SMPP Decoder SPR Adapter SMS Router Logic SMPP Encoder Rules Engine Rules Files SMSC Subscriber Profile Repository SP 1 SP n Convergent Billing System . . . . SMPP Get Subscriber Info Subscriber Info SMS Information SPR Information Selected Serv. Prov. Billing Info
  • 18. / ... SMS Router The Rules > ALL available information from SMPP (the SMS) and from SPR (customer info) is passed to the rules engine • SMPP: Originator Address, Destination Address, Encoding Language, SMS Text, … • SPR: Pre or Postpaid, Corporate or Individual, Address Rules Engine: Drools – Table Based
  • 19. / ... SMS Router The Change Request The customer’s initial request > A system which: • Can accept connections from multiple service providers • Is able to route SMSes to the right Service Provider based on the destination number • Charges the subscriber based on the destination Short Code of the SMS • Restricts access to certain Short Codes for prepaid subscribers Later requests > Share a short code between different Service Providers based on the first word of the SMS text > Restrict the access of corporate subscribers to certain short codes
  • 20. / ... SMS Router The Change Request Simple Solution > Taking advantage of the information passed to the rules engine was not restricted to the initial need > The new functionality was implemented by only updating the rules • SMPP: Originator Address, Destination Address, Encoding Language, SMS Text, … • SPR: Pre or Postpaid, Corporate or Private, Address
  • 21. / ... Rules Engines in Telco Reference 2: SS7 Firewall 05
  • 22. / ... SS7 Firewall What the Customer Wanted > The customer wanted a system which: • Intercepts incoming traffic from SS7 interconnect partners; • Allows legitimate traffic to go through and rejects malicious messages (as specified by GSMA IR.82); • Allows detection of new type of attacks, not known at RFP date; • Does not restrict them in setting up commercial agreements with partners (e.g. MVNOs); • Is able to handle 10,000 TPS;
  • 23. / ... SS7 Firewall The solution SS7 Firewall MAP REQUEST  CgPA  CdPA  [MAP Parameters] In-memory data store Rule engine  Get context data  Determine treatment  of current request Action > Rules Engine decides if a message is a valid one or an attack; > The Rules Engine receives information from: 1. The incoming message from SCCP, TCAP and MAP layers; 2. The context of the message (for sessions); 3. External sources of information (HLR which provides the real subscriber location)
  • 24. / ... SS7 Firewall Rules examples Handling of ISD (Insert Subscriber Data) according to GSMA IR.82 -> reject all incoming traffic for own IMSI ranges. ; IF (OpCode=ISD AND IMSI=22610*) THEN Reject+Alarm (defrule rule-for-prod-2p (ParamInMAP (opCode "7")) (ParamInMAP (IMSI “22610*")) => (reset) (assert (ParamOut (action 3) (sendAlarm 1) (alarmAdditionalInfo "Reject: ISD and within own IMSIs range")))) The customer wanted to have an MVNO using interconnect links which should be considered as “own network”. By passing all available info to the rules engine, this requirement is solved with a simple rule modification. (defrule rule-for-prod-2p (ParamInMAP (opCode "7")) (ParamInMAP (IMSI “22610*")) (not (ParamInSCCP (CgPA “4012234567890"))) => (reset) (assert (ParamOut (action 3) (sendAlarm 1) (alarmAdditionalInfo "Reject: ISD and within own IMSIs range"))))
  • 25. / ... Rules Engines in Telco Reference 3: Real-Time Antifraud System 06
  • 26. / ... Real-Time Antifraud System What the Customer Wanted SYSTEM Identify potential frauds on the voice calls Easy modification of the parameters involved in fraud detection Add new scenarios Multiple operators in the group