day 1-t6-1450 david-chambers-20120523
DESCRIPTION
LTE World Summit Barcelona May 2012Day 1TRANSCRIPT
Impact of LTE Small
Cells and Backhaul
Scalability
David Chambers
Director of OSS Solution Marketing
May 2012
Agenda
● The impact of 4G on network topology
● How Backhaul Networks are changing
● How Backhaul Network management will evolve
● Implications for tools and processes
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 2
Amdocs - Advertisement
● Large company focussed on Telco
● 19,000 staff; $3Bn revenues
● Focussed on Telco and Cable operators
● Billing, Customer Care and OSS
● Customers include many major Tier-1 operators
● Comprehensive product and service portfolio
● Complete BSS/OSS stack from order capture to fulfilment
● Own products + SI + Consultancy + Managed Services
● Customer Experience Systems
● The “Intentional Customer Experience”
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 3
Changing pattern of investment in Radio Access
● Conventional macro/
micro tailing off quickly
*Rethink Technology Research: Carrier Survey 2011. Investment in basestations (excluding backhaul, cellsites)
97% of wireless network
traffic today is data
– Hutchison 3UK
● Small Cell (Pico/Metro)
investment will be largest
share by 2015
● Metrocell most rapidly
growing type
Factors affecting Backhaul (1 of 3) Network Structure is changing
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 5
Data Capacity
Network
Topology
Small Cells
HetNet
Many more links
Many more sites
Multi-RAT
2G/3G/4G
Single-RAN or
Multiple
basestations
per cellsite
Mix of new and old
transmission
technologies
High
Speed
Ethernet
IP
“4 Small Cells to 1 Macrocell is a
good ratio in dense urban LTE
environments”
- Hauwei (at LTE LATAM 2012)
“In 2011, US Wireless carriers
allocated roughly two-thirds of
their spend on OCx [50Mbps] &
higher bandwidth circuits”
- Atlantic-ACM (Analyst)
Factors affecting Backhaul (2 of 3) Growing focus on cost
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 6
Cost Pressures
Network
Sharing
3rd Party
Leased Lines
Avoid backhaul bottlenecks
Avoid overbuild
Track 3rd party costs
Knowledge to make best decisions
Long term strategic planning
Factors affecting Backhaul (3 of 3) While still retaining high quality
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 7
Quality
High Network
Resilience
Rapid Outage
Resolution
Timing &
Sync
View current/future network structure
Assess impact of planned/unplanned outages
“Quality in a product or
service is not what the
supplier puts in. It is what
the customer gets out and
is willing to pay for.”
- Peter F Drucker
Backhaul Planning Capabilities
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 8
In-Stat predict
3 million small
cells by 2015
● Scale to large volumes
● Up to 10x number of cellsites in high traffic urban areas
● Many more backhaul links, including 3rd party
Backhaul
growing as
proportion of
RAN cost
● Cost requires capacity management
● Backhaul planning independent of cellsite capacity
● Strategic view of hubs/spoke, wireless/wireline
● Cater for priority traffic profile
Deploy a small
cell in 1 hour ● Speed of deployment
● Fast & flexible incremental small cell deployment
● Introduce new products & technologies quickly
Backhaul Operational Capabilities
● Filter out the noise
● Suppress alarms from planned/non-commissioned equipment
● Understand when alternate routes can be used
● Rapid Impact Analysis
● Determine scope of outage in seconds, not hours
● Identify partial vs full outages
● Visibility
● Of who did what, when and why
● Current and planned network configuration
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 9
But today’s tools/processes aren’t suitable
● Often spreadsheets, Visio diagrams
● Poor data quality – planners don’t know
what’s there today
● At best, current view only – no idea
what’s coming next
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 10
Knowledge is key
● Technical Inventory
● Physical equipment and logical connectivity/routing
● Current and future upgrade plans
● Configurable/futureproof to handle new technologies/products
● Automated design processes
● Automated design process for new/upgraded cellsites/transmission
● Unambiguous design instructions for staff and direct configuration
● Widely accessible but tightly controlled
● Web browser access by all engineering staff
● Open APIs to interwork/access via other applications
● Secure sign-on with read/write privileges by region and/or role
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 11
Solution Description Comprehensive support across the operations department
12
Network ERP
System
WFM
System
Inventory Configuration Management
Data Integrity
Management
Upper layer Program
Management Workflow
Microwave
Freq. Planning
Fault & Service
Management
Other
OSS/BSS
Geographical
Information
Data
Warehousing
Radio Network
Strategic Plan
Trouble
Ticketing
Implementation Plan
Management
Automated Technical
Design Workflow
Capacity Utilisation &
Optimisation Planning
Electronic
Activation
Core Network
Strategic Plan
Project
Managers
Network
Designers
NOC
Field Force
Engineers
Inventory Capabilities:
• RAN, Core & Transport
• Multi-Vendor
• Multi-Technologies
• Network Infrastructure
• Connectivity Configuration
• Capacity Trending
• Templates
• Lifecycle Management
• Future State Planning
• Site Planning
• Localisable
• Role Based Security
• Reporting
Benefits
● CAPEX
● Avoid wasted equipment, overbuild, orphaned capacity
● Just-in-time deployment to match network capacity growth
● OPEX
● Avoid wasted truck rolls
● Prioritise fault resolution
● Quality
● Higher network resilience to faults
● Reduced backhaul capacity bottlenecks
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 13
Thank You
David Chambers
Director of OSS Solution Marketing
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs 14