taking policy to the
smart connected device

Highlights of Policy Control & Data Pricing Conference 2013 – Part 1 #PolicyControl

Written by GoS on . Posted in Blog

We are delighted to have seen such excellent discussion and debate at last week’s Policy Control conference and welcome continued debate on our LinkedIn group, “Taking policy to the smart connected device”, which can be found here. Join in and contribute your opinions and observations about the key themes of this year’s Policy Control conference.

Here are some of the “hot topics” that we have uncovered:


The need for a “feedback loop” involving real or near-real time analytics that accompanies device-level policy control is likely in the future if MNOs want to apply appropriate policy decisions. We agree, along with many others, that the device is one of the best places to create both an end-to-end and customer-eye-view of the network, specifically of its performance at the application level. We also agree that it is essential to be able to make these performance measurements independent of the Radio Access Network. For example, a rule that forces a device to always choose WiFi over 3G (when available) may not be appropriate until the performance of the WiFi network can be established in real-time and then applied to the policy decision.

WiFi Offload and Distributed ANDSF

Taking bulk data away from the network benefits both the operator and the user in that it reduces strain on the network and it also reduces the use of the subscriber data bundle. Essentially, MNOs need a solution that delivers excellent network connection from those available and that optimises user experience.

WiFi hotspots and ANDSF were both big points of discussion. The key drivers behind these two elements are the ability to reduce the cost of service delivery, and the availability of high speed WiFi technology to improve user experience in congested inner city cells.

Additionally, through device-level policy control, decisions can be made at an application, deciding which applications should be used over which access technology. For example, apps running on the device can be managed by the policy software before they attempt to connect to the network and before the signalling process begins.

Watch out for more insight soon in part 2.

Tags: , , , , , , , , , , , , ,