A method and system are disclosed to analyze journeys of at least one subscriber consuming a plurality of Internet services, using at least one device over multiple access technologies. The method and system store in a database, for each subscriber, a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The method and system collect, by means of multiple monitoring probes, real time data from IP traffic; and extract information from the collected real time data, the information comprising one of the unique identifiers. The information is transmitted to an analytic system, where it is aggregated per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. For each subscriber, a journey is generated, by processing the aggregated information with the analytic system. A subscriber's journey consists of a list of Internet services consumed by the subscriber, with descriptive parameters. The descriptive parameters may consist of at least one of the following: timestamps to indicate beginning and end of service consumption, type of device used, access technology used, type of Internet service, additional specific parameters related to each specific Internet service.
Additionally, a method and system are disclosed, wherein the subscribers' journeys stored in the database are further analyzed by the analytic system from a Business Intelligence perspective. The analysis from a Business Intelligence perspective includes: determining trends and behaviours among subscribers consuming Internet services over a multitude of devices and access technologies, and identifying clusters of subscribers with similar consumption patterns of Internet services over a multitude of devices and access technologies.
Also, a method and system are disclosed, wherein the multiple monitoring probes are deployed at different locations, to cover the plurality of devices and access technologies available to the subscribers. The monitoring probes include: network probes deployed in a mobile network, network probes deployed in a fixed broadband network, network probes deployed in a fixed/mobile convergence network, embedded probes deployed in mobile devices, embedded probes deployed in Residential Gateways, embedded probes deployed in Set Top Boxes, embedded probes deployed in televisions.
And, a method and system are disclosed, wherein the types of Internet services include: web browsing, messaging, IPTV (Internet Protocol Television) and VOD (Video On Demand), video and audio streaming, on-line gaming, social networking, e-commerce, VoIP (Voice over IP).
In the appended drawings:
Nowadays, end users have the capability to consume specific
Internet services from anywhere and at anytime, and the tendency is to generalize this capability for any type of Internet service. This trend is supported by the availability of such Internet services over various access technologies, such as fixed broadband networks (e.g. DSL (Digital Subscriber Line), cable or optical fiber) and mobile networks (e.g. cellular or WIMAX (Worldwide Interoperability for Microwave Access)). Additionally, various end users' devices (e.g. computer, mobile phone, TV set, gaming platform) support the consumption of Internet services, with an end user experience dependant on the specific technical capabilities and limitations of each device.
A typical example is the availability of web services, originally on computers only; now on mobile phones also, and by extension on any type of device with Internet connectivity. Web services are also becoming available on televisions receiving IPTV (IP based television) services, as a component of interactive services aimed at complementing the traditional television experience.
Another example is the ubiquitous availability of IPTV on standard television appliances, as well as on computers and on any type of multimedia capable devices (including mobile phones).
Various stakeholders are interested in gathering and analyzing the habits and behaviours of subscribers in terms of Internet services consumption. The analysis mentioned here is from a Business Intelligence and marketing perspective. For instance, a converged network Operator, with a fixed broadband network and a mobile network (e.g. cellular or WIMAX), is particularly interested in understanding the dynamics and specific patterns of converged Internet services consumption over the various networks it operates, through a variety of IP enabled multimedia devices.
However, for the present time, means to perform the aforementioned analysis are limited to: either a specific access network technology, or to a limited range of Internet services, or to a specific type of IP enabled multimedia device. Thus, the impact of the availability of converged Internet services cannot be evaluated.
Therefore, there is a need for overcoming the above discussed limitations, related to the analysis of multiple Internet services consumption, via multiple devices, over multiple access technologies. An object of the present method and system are therefore to provide a method and system for subscriber journey analytics.
In a general embodiment, the present method is adapted for analyzing journeys of at least one subscriber consuming a plurality of Internet services using at least one device over multiple access technologies. For doing so, the method stores for each subscriber a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The method collects by means of multiple monitoring probes real time data from IP traffic. The method extracts information from the real time data, the information comprising one of the unique identifiers. The method transmits the information to an analytic system. The method aggregates the information per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. The method generates for each subscriber a journey, by processing the aggregated information with the analytic system. A subscriber's journey consists of a list of Internet services consumed by the subscriber, with descriptive parameters.
In another general embodiment, the present system is adapted for analyzing journeys of at least one subscriber consuming a plurality of Internet services using at least one device over multiple access technologies. For doing so, the system comprises a database for storing for each subscriber a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The system comprises multiple monitoring probes for collecting real time data from IP traffic, and for extracting information from the real time data, the information comprising one of the unique identifiers. The system comprises an analytic system for processing the information transmitted by the multiple monitoring probes. The processing includes: aggregating the information per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. The processing further includes: generating for each subscriber a journey by processing the aggregated information. A subscriber's journey consists of a list of Internet services consumed by the subscriber, with descriptive parameters.
In an additional embodiment of the present method and system, the descriptive parameters may consist of at least one of the following: timestamps to indicate beginning and end of service consumption, type of device used, access technology used, type of Internet service, additional specific parameters related to each specific Internet service.
In another additional embodiment of the present method and system, the subscribers' journeys stored in the database are further analyzed by the analytic system from a Business Intelligence perspective. The analysis from a Business Intelligence perspective includes: determining trends and behaviours among subscribers consuming Internet services over a multitude of devices and access technologies, and identifying clusters of subscribers with similar consumption patterns of Internet services over a multitude of devices and access technologies.
In another additional embodiment of the present method and system, the multiple monitoring probes are deployed at different locations, to cover the plurality of devices and access technologies available to the subscribers. The monitoring probes include: network probes deployed in a mobile network, network probes deployed in a fixed broadband network, network probes deployed in a fixed/mobile convergence network, embedded probes deployed in mobile devices, embedded probes deployed in Residential Gateways, embedded probes deployed in Set Top Boxes, embedded probes deployed in televisions.
And in still another additional embodiment of the present method and system, the types of Internet services include: web browsing, messaging, IPTV (Internet Protocol Television) and VOD (Video On Demand), video and audio streaming, on-line gaming, social networking, e-commerce, VoIP (Voice over IP).
Referring now to
The term “Internet services” shall be interpreted in a broad sense, and encompasses any service delivered over the Internet Protocol (IP). In the present method and system, the Internet services are grouped by types for clarity purposes only. A type of Internet service is represented by all the applications and Internet protocols offering the same type of service to the subscriber, for instance: web browsing, messaging, video and audio streaming, Voice over IP, etc.
Two different access networks 10 are represented in
Three different devices are represented in
The computer 4 represented in
The mobile phone 6 represented in
As mentioned above, the general trend is a convergence in device capabilities, in terms of available access technologies, multimedia capabilities, processing power, as well as in terms of Internet services available via the device. This is particularly true for the nomadic types of PCs (laptops, netbooks, Mobile Internet Devices, etc), and the high end mobile devices (smart phones). The convergence also involves the access technologies themselves. For instance, a femtocell is a cellular access point, which can be deployed in the homes. It offers short range cellular radio coverage, but uses the fixed broadband connection of the home as a backhaul to the core cellular network.
Three different converged IP core networks 20 are represented in
The networking service provider network 24 represented in
The networking service provider network 24 is also connected to the public Internet 22, from which Internet services 30 from a wide range of third party application service providers can be accessed. Also, the networking service provider network 24 may be connected to an IMS network 26 of the network Operator, from which a mix of proprietary (network Operator), and third party, Internet services 30 may be accessed. IMS is a reference network architecture for deploying converged Internet services, which can be accessed seamlessly via different access technologies (mobile 14 and fixed broadband 12 in
The networking service provider network 24 represented in
Several types of Internet services 30 are represented in
Initially, web browsing 31 was available on a PC 4 via a fixed broadband access network 12. Today, it is also available on a mobile phone 6 via a mobile access network 14. Also, web services 31 were initially accessible via the public Internet 22. Today, proprietary web portals have been developed and hosted by mobile Operators or ISPs. These web portals are accessible directly via the networking service provider network 24. Finally, value added interactive web services are now available on a TV set 2, via a fixed broadband access network, as a complement to standard television services.
IPTV and VOD 32 are available on a TV set 2 via a fixed broadband access network 12. Mobile Operators have also deployed technologies to make IPTV services available on a mobile phone 6 via the mobile access network 14. The IMS network 26 is generally considered as an effective technology to facilitate the distribution of converged IPTV and VOD services, which can be accessed seamlessly from a TV set 2 or a mobile phone 6, respectively via a fixed broadband access network 12, or a mobile access network 14. A laptop 4 (or any similar nomadic device, including a netbook, a Mobile Internet Device like a tablet, etc) benefits from this convergent approach, allowing the consumption of IPTV or VOD services anywhere, using the most appropriate access network technology 10, based on the current device location.
Video and audio streaming 33 are similar to IPTV and VOD 32 in terms of networking and applicative technologies involved. However, video and audio streaming offerings are available for free or as a paid service, from a multitude of third party service providers. On the other hand, IPTV and VOD offerings are traditionally supported by ISPs and mobile Operators themselves, as part of their value added services (however, some independent service providers are trying to bypass the traditional network Operators, offering IPTV or VOD services directly on the network Operators infrastructure). As regards video and audio streaming, the most common way of consuming these services is on a PC 4 via a fixed broadband access network 12. Alternatively, these services are also available on a (high end) mobile phone 6, via the mobile access network 14.
On-line gaming 34 is available on a TV set 2 (with a dedicated video game console) or on a PC 4 via a fixed broadband access network 12; and on a mobile phone 6 via a mobile access network 14. Today, the games available on a mobile phone are still different from those available on a PC or a TV set (in terms of complexity and multimedia experience). However, in the near future, one can expect a convergence, specifically for on-line gaming. In this perspective, the IMS infrastructure 26 is a suitable technology to offer a uniform end user experience, independently of the access network technology and end user platform.
Initially, messaging 35 was available on a PC 4 via a fixed broadband access network 12. Its most common form is the traditional e-mailing technology. It has been extended to offer web based instant messaging capabilities via web portals. Today, it is also available on a mobile phone 6 via a mobile access network 14. The possibility to offer messaging services on a TV set 2, as part of advanced interactive television services, is also available.
Social networking 36 is a category of interactive Internet services based on the paradigm of the web 2.0. However, it can be seen as a combination and extension of traditional web 31 and messaging 35 services. As such, the characteristics of web and messaging services which have been described previously can be applied to social networking.
E-commerce 37 can be considered as a sub-category of the generic web services 31. As such, the characteristics of web services which have been described previously can be applied to e-commerce.
VoIP (Voice over IP) is an additional type of Internet service (not represented in
In the previous examples, several use cases have been developed for each type of Internet services 30 described in
Today, a single user usually has a subscription to a fixed broadband service for its household, and a subscription to a mobile service. More and more often, a single network Operator provides both the fixed broadband and mobile subscription, and operates these two access networks as part of a fixed/mobile convergence strategy. Thus, a single user may access a variety of Internet services 30 via different access networks 10, using several devices (e.g. 2, 4, 6). From a marketing perspective, it becomes critical for a converged network Operator to follow, understand, and predict the behaviors of its subscribers, taking into account the variety of devices, access networks, and Internet services, available. The notion of subscriber's journey will be introduced in
Referring now to
The present method and system relies on the ability to identify a specific subscriber consuming Internet services, whatever the type of device he is using for this purpose. Thus, the converged network Operator maintains in a database a list of the subscribers for which the subscriber's journey is memorized and analyzed. For each subscriber in the database, a series of unique identifiers is stored, corresponding to each specific device that the subscriber uses to consume Internet services. As will be illustrated in
A unique federating identifier is used to federate the multiple unique identifiers associated to the devices owned by each subscriber. This unique federating identifier can be seen as the primary key to the subscribers, in a database terminology. The exact nature of this federating identifier is specific to the converged network Operator. It may be an identifier randomly generated by a computer for each subscriber, according to a pre-defined hexadecimal format. Alternatively, it may be part of the demographic information related to the subscribers, for example their first and family names. For network Operators which have deployed an IMS infrastructure, a Network Access Identifier (NAI) is used as a private identity for uniquely identifying subscribers consuming IMS based Internet services. It usually has the following format: username@operator.com. It is used to correlate several public identities (which can be associated to the same subscriber using various IMS services) to a unique referencing identity (the NAI of the subscriber). In the case where the converged infrastructure of the converged network Operator considered in the present method and system relies partly or entirely on the IMS technology, the use of a NAI as the federating identifier of the subscribers may be a logical choice.
Regarding the unique identifier of each device used by the subscriber to access Internet services, it is dependent on each specific type of device, and on the type of access technology supported by the device. A device may support several access technologies (for example cellular and WLAN for a mobile phone), requiring a unique identifier per access technology supported. Two main constraints apply to this identifier: it must be unique to unambiguously identify the owner of the device. And it must be collectable by one of the monitoring probes described in
The first column 100 represents the unique federating identifier for the subscribers of the converged network Operator. One among the possible federating identifiers previously described (randomly generated identifier, subscriber's name, NAI, or any other relevant identifier) is used for this purpose.
The rows 160, 170, and 180, represent three different subscribers with different configurations in terms of devices owned. These three examples of subscribers illustrate the type of unique identifiers used for each type of device. Subscriber_1, subscriber_2, and subscriber_N, (in column 100) represent the unique federating identifiers of these three subscribers.
The second column 102 represents the unique identifier used for the TV set of the subscriber, in the context of the consumption of IPTV services in the household. This identifier is not linked to the TV set itself, but is the Media Access Control (MAC) address of the STB dedicated to this TV set. As already explained, a TV set is directly connected to a STB to access IPTV services. Thus, the STB MAC address is a proper identifier to uniquely identify the device used by the subscriber to access IPTV services. Nowadays, advanced TV sets may include the STB functionality, in which case the TV set itself will have a MAC address, which is used as the unique identifier. Some households may have several STBs (connected to several corresponding TV sets), in which case the MAC address of each STB is mapped to the same subscriber of the IPTV service. Following is an example illustrated in
The third column 104 represents the unique identifier used for the mobile phone of the subscriber, in the context of the consumption of Internet services via a mobile network. In any type of mobile network, the mobile devices are allocated a unique identifier by the manufacturers. For example, in the case of a Universal Mobile Telecommunication System (UMTS) network or a Long Term Evolution (LTE) network, the International Mobile Equipment Identity (IMEI) uniquely identifies each mobile phone. In the case of a Code Division Multiple Access (CDMA) network, an equivalent of the IMEI is used. And in the case of a Microwave Access (WIMAX) network, the unique identifier is a MAC address allocated to the mobile terminal. Following is an example, illustrated in
In the case of a mobile network, if for any reasons the unique identifier of the mobile device cannot be used (for example, it cannot be collected by the monitoring probes represented in
Additional equipments like laptops, netbooks, Mobile Internet Devices, may have a mobile networking interface to access mobile networks. This mobile networking interface has a unique identifier like a traditional mobile phone, for example an IMEI. Thus, such equipments with an interface to access mobile networks, and a subscription to mobile services with the converged network Operator, appear in the column 104 dedicated to mobile phones. Their IMEI is memorized, in relation to the subscriber who owns the mobile service subscription associated to the laptop, netbook, or Internet Mobile Device. These equipments may also contribute to column 106, when used in the context of a fixed broadband Internet connection (via a different network interface like a WLAN interface).
The fourth column 106 represents the unique identifier for home devices owned by the subscriber, and used in the context of the consumption of Internet services via a fixed broadband Internet connection at home. The term “home devices” is used, to represent any type of device allowing access to Internet services (other than IPTV) over a fixed broadband Internet connection. Currently, it mainly consists in computers. Since it is not practical (and usually not even feasible) to uniquely identify each individual home device, the MAC address of a Residential Gateway (RG) is used as a unique identifier representing all the home devices. The RG is the equipment directly connected to the fixed broadband network, and providing Internet connectivity to the household (e.g. via intra-household WLAN and Ethernet connections). There is one RG per subscriber, and the MAC address of its networking interface connected to the fixed broadband network uniquely identifies each subscriber. Following is an example illustrated in
For simplification purpose, the case of the WLAN hotspots is not represented in
In the case of the television 102, or the home devices 106, several end users in the same household may use these devices, and it is not possible to identify them individually. They are all related to the same unique subscriber, who subscribed to the IPTV service, and/or to the fixed broadband Internet service. The journey described in
In the case of a subscriber's journey representative of several members of a household, various technologies may be used to further identify each specific member of the household. In an example of implementation, this may be done by monitoring identities used on the Internet, credit card accounts, online banking, purchases, social networking accounts, etc. Alternatively, the type of content accessed via the Internet services, and the on-line behavior of the various members of the household, may be used to identify them.
Referring now to
All the activities of a subscriber related to Internet services consumption are recorded, taking into account any type of device and any type of access network used by the subscriber. The aggregation of this recorded information constitutes the subscriber's journey. The means for collecting and recording this information will be detailed in
The subscriber's journey records described in
For each record, two timestamps 200 are used to indicate the beginning of the usage of a specific Internet service, and the end of its usage. A single timestamp per record is represented in
For each record, the type of device 210 used to consume a specific Internet service is indicated. In the example illustrated in
For each record, the type of access network 220 used to consume a specific Internet service is indicated. In the example illustrated in
For each record, the type of Internet service 230 consumed by the subscriber is indicated. A record is dedicated to a single Internet service, consumed on a single device via a single access network. If necessary, a record may be divided into sub-records, for instance to take into account a variation of the additional parameters 240 for the same Internet service 230. The type of Internet service is expressed in a high level description meaningful to the marketing team of a network Operator. In our example in
Additionally, details about the underlying Internet protocols and applications related to a specific instance of an Internet service may be included in the subscriber's journey. For instance, messaging represents one of the relevant Internet services for the subscriber's journey. However, there are multiple applications which provide a messaging service. Thus, it may be of interest for the network Operator to know more precisely which specific application and/or Internet protocols are used, when an instance of the messaging service occurs.
For each record, additional parameters 240 relevant for a specific type of Internet service 230 are indicated. The type and the number of additional parameters is fully dependant on the Internet service considered. Examples of such additional parameters appearing in
There may be some overlapping in the timestamps 200 related to different records. This is due to the fact that several Internet services 230 may be used in parallel. This is particularly true for a computer, and now for high end mobile phones, which can run several applications in parallel.
Examples of records constituting a subscriber's journey are given in
Record 250 logs the consumption of IPTV on the TV set via the cable network, with the following additional parameters: news have been viewed on channel 12. Both the channel (12) and the type of program viewed (news) is logged. As already explained, the STB associated to the TV set is usually used in place of the TV set itself, for generating the journey. The monitoring probes described in
Record 252 logs a web browsing activity on the laptop via the cable network, with the following additional parameter: a sport portal has been accessed. In fact, two additional parameters are recorded: the URL (Uniform Resource Locator) of the portal, as well as a classification of the portal content: sport. The classification of the web pages viewed by a subscriber is a complex task, which can be based on the analysis of the URL, or on the analysis of the web pages content. It is out of the scope of the present method and system, but is considered to be achievable with the appropriate technology. Record 252 illustrates the potential need for the use of sub-records. If different types of web portals are accessed during the same browsing session, a sub-record can be created for each different portal, logging the appropriate timestamps 200, and additional parameters 240 (URL and classification of portal content). As already explained, the RG associated to the laptop is usually used in place of the laptop itself for generating the journey in the context of a fixed broadband Internet connection. The monitoring probes described in
Record 254 logs the consumption of IPTV on the mobile phone via the mobile network, with the following additional parameters: news have been viewed on channel 12. Both the channel (12) and the type of program viewed (news) is logged. As already mentioned, the IPTV service 254 consumed on the mobile phone is considered as different from the IPTV service 250 consumed on the TV set. The unique identifier 210 of the mobile phone (IMEI) is recorded, for further mapping to the related subscriber as described in
Record 256 logs an on-line gaming activity on the laptop via a WLAN hotspot, with the following additional parameter: the game in use is Formula 1 tournament. As already explained in relation to
Record 258 logs a web browsing activity on the mobile phone via the mobile network, with the following additional parameter: a sport portal has been accessed. In fact, two additional parameters are recorded: the URL (Uniform Resource Locator) of the portal, as well as a classification of the portal content: sport. The unique identifier 210 of the mobile phone (IMEI) is recorded, for further mapping to the related subscriber as described in
Record 260 logs an on-line gaming activity on the mobile phone via the mobile network, with the following additional parameter: the game in use is Formula 1 tournament. The unique identifier 210 of the mobile phone (IMEI) is recorded, for further mapping to the related subscriber as described in
All the subscribers' journeys are further analyzed from a Business Intelligence perspective by an analytic system. The positioning of the analytic system in the global solution will be detailed in
The main goal is to analyze the impact of providing converged Internet services, in order to understand emerging subscriber's behaviors, and discover new opportunities to develop revenues. For instance, by determining how the availability of specific Internet services on various access technologies and devices influences and modifies the subscriber's usage, the same dynamics can be applied to legacy non converged Internet services and drive the development of new converged Internet services.
One exemplary use case is a modification of usage due to ubiquitous availability. For example, it has a growing impact in the case of on-line gaming. The traditional way to play was at home, on a computer or on a TV set (using a video game console), via a fixed broadband Internet connection. Now, it is possible to enjoy on-line gaming almost everywhere via a smart phone or a nomadic computer, using a mobile or WLAN hotspot connection. By analyzing the subscribers' journeys, focusing on on-line gaming, some generic trends can be discovered: matching a specific category of on-line video games with a particular consumption pattern. The result may be, for example, that it is not worth developing a certain category of on-line video games for mobile usage, since users prefer to play them at home on a fixed computer or TV set. On the contrary, other categories may be well suited to mobile usage (smart phone and nomadic computer), to the point where such video games might be developed exclusively for mobile platforms. The last category would be ubiquitous on-line video games, for which the end user is willing to play at anytime and anywhere. In this case, it is necessary to adapt this type of game to any available device and access technology, and possibly offering a premium service granting this ubiquitous availability (the revenue generated by this premium fee can be shared between the game distributor and the converged network Operator).
Ubiquitous availability also has a growing impact on the consumption of television as an Internet service. IPTV is now available on any type of device, and via any type of access technology (fixed broadband, mobile). The analysis of the subscribers' journeys can help segment the different types of programs among categories. One category includes programs preferably consumed at home (or more generally in a fixed location), like documentaries, sport events, movies. Another category includes programs preferably consumed on the move, like short news reports. Another category includes programs followed on any kind of available medium, leveraging the ubiquitous availability of IPTV. For example, short television series are now adapted to be viewed on traditional TV sets, computers, and smart phones; live or as a VOD service. Thus, the end user has the capability to view this type of series anywhere, anytime. Additionally, the emergence of the following trends may be detected: transition from IPTV programs originally consumed exclusively at home, now being increasingly consumed on mobile devices; emergence of new IPTV programs consumed almost exclusively on mobile devices like smart phones.
Another use case is the identification of new usages involving the consumption of several related Internet services over various devices and access technologies. By an in-depth analysis of the subscribers' journeys, such tendencies can be discovered. The idea is that the consumption of these different Internet services through a converged experience brings more value to the end user, compared to the consumption of each Internet service individually. The network Operator can use this experience to extrapolate which combination of Internet services may be appealing to the subscriber, and to build value added Internet services offerings, including a combination of several Internet services over multiple end user devices and access technologies. For example, viewing (via a TV set at home) of thematic television channels focusing on music and movies, or news, can be related to the access (via a smartphone) to dedicated web portals for buying and downloading related music and movie programs, or short news articles. More generally, an interesting aspect to understand is the correlation between free Internet services and premium Internet services, the first type being identified as an incentive for the consumption of the second type.
Another use case is the segmentation of the subscribers by groups of users with similar behaviors and expectations in terms of Internet services offerings. By analyzing the subscribers' journeys, some groups of users with specific consumption patterns are identified (e.g. same types of Internet services consumed over same type of device and via same access technology). These patterns may then be related to user demographics information, like age, sex, localization, average revenues, and the likes. If an association can be made between consumption patterns and demographics patterns, it can be used as a marketing tool by the network Operator, to propose specific Internet services, rate plans, Internet services bundles (through a matching of the consumption patterns to members of the corresponding demographic groups).
Another use case is the gathering of operational statistics for each Internet service, over each device, and via each access technology. Such statistics include, to name the most common, the volume of data, the duration of use, the time of use, the average number of users, and the localization during the use. This type of information is critical to decide on the most appropriate billing strategy. Innovative Internet services bundles and billing policies can be derived from the aforementioned statistics, to better differentiate the offerings of the converged network Operator from its competitors.
Referring now concurrently to
The first step consists in collecting raw data related to Internet services consumption. For this purpose, several monitoring probes distributed over a set of locations collect the raw data. Since the Internet services are consumed on a variety of devices, in different locations, and via various access network technologies, it is not possible to have a single monitoring probe located in a single emplacement to collect all the necessary data.
An optimal way to collect the raw data is to deploy network probes in the different types of access network infrastructures. Usually, for each type of access technology, there is one or several point(s) of convergence, where the IP traffic related to Internet services consumption is aggregated. This is the ideal point of deployment for a network probe. For instance, as illustrated in
Though a single network probe per access technology is represented in
In the case of a fixed broadband network based on the DSL (Digital Subscriber Line) technology, the network probe 361 may be deployed at different points of the network infrastructure, depending on architectural choices made by the network Operator. For example, the network probe 361 may collect the traffic aggregated by a DSLAM (Digital Subscriber Line Access Multiplexer). Since this equipment is close to the end user, the number of DSLAMs deployed in a typical DSL network may reach thousands of units, involving scalability issues for the deployment of the network probes 361. Alternatively, the network probe 361 may collect the traffic aggregated by a BRAS (Broadband Remote Access System). Since a single BRAS aggregates the IP traffic of many DSLAMs, the number of BRAS in a typical DSL network ranges from one to a few, making this second type of deployment more scalable. Generally speaking, the network probes 361 deployed in the fixed broadband network 300 collect the IP traffic related to the Internet services consumed by the subscribers.
Beyond the aforementioned examples, the deployment of the network probes 361 and 362 can be generalized to any kind of fixed broadband network 361 (e.g. DSL, cable, optical fiber) and mobile network 310 (e.g. cellular or WIMAX).
The network probes 361 and 362 are based, for example, on the DPI (Deep Packet Inspection) technology, which is well known in the art. It relies on the inspection of IP packets along the various network layers of the OSI (Open Systems Interconnections) model. The main layers to consider are the network layer, the transport layer, the session layer, and the applicative layer. Various parameters are extracted along these layers, allowing the correlation of various IP packets inside a single applicative flow, the recognition of the protocols and applications in use for each of these flows, and the extraction of specific data relevant to a particular type of protocol or application. Ultimately, a given type of Internet service is characterized by the aforementioned collection of information.
For most Internet services, which can be consumed on several different access network technologies, like web browsing, a dedicated network probe 361 or 362 must be used for each access technology, in order to collect the related IP packets and extract the information necessary to generate the subscribers' journeys. However, with the convergence of Internet services delivered over various access technologies, it becomes possible to deploy a network probe 363 in a fixed/mobile convergence network 320. Such a fixed/mobile convergence network 320 can be defined as a network where the access to converged Internet services is centralized. The fixed/mobile convergence network 320 provides a normalized interface to a selection of converged Internet services. It performs (if necessary) the adaptation (e.g. video adaptation) of the Internet services delivered, to the specificities of each access network technologies 300 and 310.
An example of such a fixed/mobile convergence network is the IMS. The SIP (Session Initiation Protocol) protocol is used to control the access to IMS based Internet services, and to perform the adaptation to a specific access network technology, and possibly to the end user specific device capabilities. In this context, different protocol characteristics, and possibly even different protocols, are selected to deliver the data related to the IMS based Internet services, based on the access technology and end user device. In particular, the IMS has been specified to play this role relatively to the fixed broadband networks 300, and the mobile networks 310. Internet services supported by the IMS infrastructure include VoIP (Voice over IP), various types of multimedia delivery services (audio and video), IPTV, and in a near future on-line gaming.
A critical advantage brought by the deployment of a single network probe 363 in the fixed/mobile convergence network 320 is that it can capture the data usually collected by multiple network probes 361 and 362 deployed in the specific access networks 300 and 310. This only applies to the Internet services supported by the converged network, like those mentioned before for the IMS. However, it is likely that only the signaling traffic related to the Internet services will go through the fixed/mobile convergence network 320. The related data traffic will be directly fed to the appropriate access network 300 or 310, via a media delivery and adaptation infrastructure. However, in many cases, capturing the signaling traffic (e.g. SIP based control traffic) is sufficient to characterize the Internet service in use, and there is no need to capture the related data traffic. For instance, in the case of IPTV, the control traffic is sufficient to follow which channel a user is viewing at which time, and the data traffic does not need to be captured.
Alternatively, monitoring probes may be deployed closer to the end user. In the case of the mobile network 310, an embedded probe 367 can be integrated to the mobile phone 312. This embedded probe has capabilities similar to the network probe 362 in terms of DPI, although the available processing power on the mobile phone may be a limiting factor in terms of protocol analysis. Given the growing flexibility and modularity of mobile phone software, adding an embedded DPI probe is feasible. Alternatively, the embedded probe 367 may operate at the application layer to monitor the Internet services in use and the relevant parameters. In this latter case, a close integration with the mobile phone applicative software and operating system is necessary, and is more complex to implement. However, using a network probe 362 is preferable to using an embedded probe 367, in terms of scalability, considering the wide range of mobile phone models for which the embedded probe must be adapted (to taking into account the specificities of the software and hardware of each model of mobile phone).
In the case of the fixed broadband network 300, an embedded probe 366 can be integrated to the STB (not represented in
For the fixed broadband network 300, an embedded probe 365 can also be integrated to the RG 302. The RG 302 is the equipment providing IP connectivity, for the members of the household, to the fixed broadband access network 300. The embedded probe 365 collects the data related to the consumption of all kinds of Internet services for the household. The data include the Internet services consumed on a computer 308, and may also include the IPTV services consumed on a TV set 306 (the monitoring of the IPTV services is then performed at the RG level, instead of the STB level as previously described).
Each monitoring probe has the capability to capture the unique identifier of the device used by the subscriber to consume Internet services, as explained in relation to
In the case of the network probe 361, the MAC address of the RG and the MAC address of the STB, are the unique identifiers of the devices used to identify the subscribers. These MAC addresses are extracted from the IP traffic generated by the RG and the STB, in the context of the IPTV service and the fixed broadband Internet service. Depending on the topology of the fixed broadband network 300, and depending on some networking options, a network probe 361 may not have the capability to capture the MAC addresses of the RG and of the STB. In this case, embedded probes in the RG 365 and in the STB 366 are used, in order to allow the collection of the aforementioned unique identifiers. These embedded probes have inherently access to the targeted MAC addresses.
In the case of the network probe 363, the same unique identifiers as those captured by the networks probes 361 and 362 may be captured, if they are present and can be extracted from the converged IP traffic of the fixed/mobile convergence network 320. Alternatively, a unique identifier of the subscriber may be used to identify the subscriber in the context of converged Internet services operated via the fixed/mobile convergence network 320. For example, the NAI previously mentioned in relation to
For every type of network probe described previously, the collected information is usually organized in the form of IP data records in a flat file. Each IP data record contains a unique identifier of a device, and information related to the usage of an Internet service by the device corresponding to the unique identifier.
In some cases, the IP packets collected by a probe contain both the unique identifier of the device, and the data used to generate/update the information related to the usage of an Internet service. Thus, an IP data record is directly generated/updated.
In other cases, the unique identifier of a device is extracted from specific IP packets, and the data used to generate/update the information related to the usage of an Internet service are extracted from other IP packets. A correlation must then be performed to generate the IP data records. For example, in the case of an UMTS mobile network, the IMEI and the IP address of a mobile device are extracted from the GTP control plane. And the data used to generate/update the information related to the usage of an Internet service by a mobile device, as well as the IP address of the mobile device, are extracted from the GTP user plane. The IP address is used to correlate the unique identifier of a device (the IMEI), with the data used to generate/update the information related to the usage of an Internet service by a mobile device.
The second step consists in transmitting the information extracted by the various monitoring probes to an analytic system 350, for the generation of the subscribers journeys, their storage, and for further Business Intelligence analysis of the subscribers' journeys.
The same principle applies for each type of monitoring probes: network based (e.g. 361, 362 and 363) or embedded (e.g. 365, 366 and 367). At regular intervals (e.g. every hour or every day), the monitoring probes transmit the collected information to an analytic system 350. This transmitted information contains records of Internet services consumption events, with at least the following information for each individual record: the type of device used, the access technology used, the Internet service consumed with its specific additional parameters, and related timestamps (in relation to
The analytic system 350 comprises a high performance database 354 (as illustrated in
The dedicated analytic engine 356 of
The main targets of these reports, among the staff of the network Operator, are the marketing and product development teams. These teams may use the reports to adapt the offering of converged Internet services. This includes (among others): making new Internet services available via multiple access networks and devices, adapting the pricing, proposing new bundles of Internet services, focusing on end user devices with specific capabilities, identifying clusters of premium subscribers, etc.
Referring now specifically to
As represented in
The analytic system 350 receives information from multiple monitoring probes 360. The multiple instances of the monitoring probes are deployed at various locations in the networks operated by the converged network Operator (for illustration purposes, three monitoring probes 362, 363, and 365, introduced in
The implementation of the monitoring probes is well known in the art. Dedicated software, and dedicated hardware in the case of the network probes, is used. Specific technologies, like for example DPI, are implemented in the software and/or in the hardware.
The pre-processing unit 352 consists in a dedicated software executed on a computer, to process the information received from the monitoring probes 360 and to update the database 354. As explained in relation to
The database 354 is a traditional database; the underlying technology is well known in the art. It is managed by the pre-processing unit 352, and is the source of information for the analytic engine 356. There is a strong requirement on the performances of the database 354, in terms of volume of information to store, and computing power for the treatment of this information; since tens of millions of subscribers may have to be managed for large converged network Operators. As already mentioned, the main information stored in the database 354 is: the unique identifiers of the devices owned by each subscriber (as illustrated in
The analytic engine 356 is an application software executed on a computer, to generate various metrics related to the subscribers' journeys, as previously explained in relation to
The reports presentation unit 358 consists in a Graphical User Interface on a computer, to present different types of reports to the end users. These reports are presented in the form of dashboards, combining pre-defined information computed by the analytic engine 356. A pre-defined list of reports is included by default in the analytic engine 356. Some new reports can also be defined, using the end user control interface 359.
The end user control interface 359 also consists in a Graphical User Interface on a computer. It offers two levels of interaction to the end users. Standard end users only interact with the reports presentation unit 358, to request the generation and presentation of a report, selected among the list of pre-defined available reports. When such a report is presented, the standard end user interacts with the report to modify a limited number of parameters and variables, and dynamically update the report (for instance, the characteristics of a subset of the subscribers for whom the journeys are analyzed, the time interval over which the journeys are generated, etc). The report is then automatically updated, with the proper information computed by the analytic engine 530.
Advanced end users have the same level of interaction with the reports presentation unit 358 as the standard end users. In addition, advanced end users are allowed to interact directly with the analytic engine 356. This capability enables an advanced end user to dynamically define a report that is generated by the analytic engine 356, and presented to standard and advanced end users on the reports presentation unit 358. For this purpose, the advanced end user selects which metrics are aggregated to generate the dynamic report, and the analytic engine 356 performs the necessary computation to prepare the data that will be necessary when the report is requested by the reports presentation unit 358. A dynamic report may be later added to the list of pre-defined reports.
Although the present method and system have been described in the foregoing specification by means of several non-restrictive illustrative embodiments, these illustrative embodiments can be modified at will without departing from the scope of the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CA10/02058 | 12/22/2010 | WO | 00 | 9/30/2012 |
Number | Date | Country | |
---|---|---|---|
61290949 | Dec 2009 | US |