Home / Blogs

Why Homegrown Subscriber ID Solutions Limit Problem Solving

Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes—such as lawful interception requests or acceptable use policy violations—can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions.

Lease data plays an important role in subscriber identification, and developing your own database of historical and/or active leases can be helpful to fulfill law enforcement requests and other related tasks. However, homegrown solutions can be limiting. In my experience, homegrown databases have limited scope due to integration issues, may have poor performance or strain the existing DHCP system, and perhaps most importantly, do not necessarily save much time.

This is because most of the time database solutions are just data-dumps, useful only for looking up information and comparing data sets. While there is certainly some value in this kind of system, large service providers that need to keep track of a multitude of subscribers, IP addresses, and MAC addresses can become overwhelmed by these kind of simplified single-use databases.

By automating the storage of active and historical leases in one central repository solution, it’s easy to track MAC addresses back to IP addresses and vice versa without straining the DHCP service. By mapping an IP address to a subscriber, you can quickly pinpoint which device has accessed or is trying to access your network at any given point in time, and which gateway it came from.

The result is faster and more accurate responses to lawful interception requests, with a bonus—it’s much easier to add additional use cases. For example, the same centralized lease solution used to answer lawful intercept requests could also be used to interrogate or command a modem for reboot, add custom notifications for subscribers, or be used for troubleshooting. This is thanks to REST APIs which allow for easy integration with third-party applications. Integration aside, streaming network-wide data into a single repository makes it much quicker to access information, reduces the risk of errors, and helps break down operational silos.

Beyond lease queries, there is also the potential to add onto the solution with cable fraud detection and automated DOCSIS firmware management. Learn more about how you can move past homegrown solutions for lawful interception requests in this article.

By Najla Dadmand, Product Manager at Incognito Software Systems

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign