Sign up FAST! Login

3 Game Changing Big Data Use Cases in Telecom

cellphone tower

Like many industries undergoing transformation,  the Infrastructure/Security/Compliance function within large telecom companies is becoming more data driven. Here are3 powerful use cases which vividly bring out new possibilities in Telecom big data

Telecom use case-1: Contact centre text mining and Telecom Bandwidth throttling


 In most organisations the contact centre channel data is analyzed typically from a SLA(Service Level Agreement perspective). For example TAT (Turnaround time), Average wait time etc. But the actual transcript of the conversation can yield powerful insights regarding telecom infrastructure usage. Surge in Contact centre keyword frequency as a lead indicator to infrastructure bottlenecks.

Telecom providers are competing with each other to get greater ARPU (Average revenue per user) from data services as opposed to voice services. In this competitive environment a telecom provider launched a new but extremely viral gaming application on Mobile devices. A few days after its launch it started observing a burst of calls to the call centres and on text mining the transcript Data Scientists found a sharp spike in the keywords alluding to performance. The specific intelligence regarding keyword burst and specific time of day at which this was encountered was shared with the infrastructure planning group which then put a plan in place to throttle the bandwidth dynamically based on usage.

Telecom use case-2 : Collocation Analysis from Cell phone towers


This is a security use case where if an investigation team wants to find out if there were multiple phones with the same person. When a call is made typically the following data points are captured - subscriber , date, time, and duration. Depending on the type of call, additional data can be gathered, including switch data, cell tower IDs, device identification (serial) numbers, as well as International Mobile Subscriber Identity (IMSI) and International Mobile Equipment Identity (IMEI) codes. The unique ID of the cell tower a handset was connected to when a connection was made is one of the most important components for collocation analysis

By examining terabytes of CDR/Tower  records from the switch one can triangulate on a few collocation events.  A co-location event can be defined as the same cellphone tower  being used to route calls during a specific point in time. This is almost like looking for a needle in a haystack and traditional solutions would have trouble handling the massive volume of tower and switch data. But with a combination of massive Hadoop clusters and columnar database architecture, these queries can be executed at lightning speed to surface a significant few events of interest from the massive ocean of log  data across devices

Telecom use case-3 : Multi device event stream analysis co-relating Firewall & IDS & Switch activity


Typically in most telecom infrastructures IDS ( Intrusion detection systems ) sit at the periphery of the network monitoring malicious activity and recording the same as log entries or alarm events into a log file. Firewalls and application logs also store  a plethora of important events which if triangulated thru a central log repository to  provide a comprehensive picture of any patterns which are dormant in the attack

One key components to enabling a Central  Log File repository with events streaming from multiple devices which are ingested and collated centrally.  Once this central log file is set up to store the torrent of event data, it can be  channelized into intelligence to optimize network infrastructure and aid security of the telecom assets.

Stashed in:

To save this post, select a stash from drop-down menu or type in a new one:

You May Also Like: