Tethering and the lure of data: How to make every byte count

Sebastian Müller portrait

By Sebastian Müller
Published on: 06.08.2020

Reading time: ( words)
Categories: Telco analytics, vEPC

We all know about the lure of data. Screen addiction has become so commonplace that in most places, connected devices have started outnumbering people. These devices have become the gateways to new forms of entertainment, information and social engagement, and many of us at some point would have turned down a good night out with friends for a long night on the screen.

It is perhaps not surprising that data has enticed many to foray into the less permissible means of finding it. Tethering for example, has become one such means. Turning a connected smartphone into an on-demand modem, and using it to power other smartphones and PCs, either via a Wi-Fi hotspot, Bluetooth or USB cable, has become a convenient means of connecting a handful of other unaccounted users to the data highway.

What is tethering?

Tethering works through the available mobile data and Wi-Fi sharing feature enabled on most smartphones. Over the last many years, sharers and users alike have enjoyed the lax rules and poor enforcement that has rendered tethering a disputable grey area. Citing increasing costs of devices and escalating tariff rates that accompany higher data speeds, the parties involved continue to justify the use of data above and beyond what is agreed with the communication service providers (CSPs).

Despite all this, tethering is not all forbidden. The number of networked devices per capita globally is expected to reach 3.6 by 20231 (with a whopping 13.6 devices per capita for the United States!). This effectively translates to each mobile user having 2 to 3 other devices that require concurrent access to the Internet. Enabling tethering will allow a subscriber to share data among their many devices, while allowing them to monitor the total usage of all their different devices from a single account and a single bill.

In fact, many CSPs have responded to this by developing plans that incorporate tethering, specifying explicitly the number of devices a subscriber may tether to or going all the way to offering ‘phone-as-a-modem’ plans. T-Mobile, for example, offers a Smartphone Mobile Hotspot (SMHS) feature in its Magenta, T-Mobile ONE and Simple Choice plans. Users can connect up to 10 devices to their smartphone’s mobile data with the usage limit depending on the plan. Verizon offers tethering services for a list of its packages including its unlimited plans, and the limit on the number of devices and data usage depends on the type of plan and the user’s device compatibility.

Unfortunately, the lure of data can be so strong that subscribers often circumvent these limits by downloading third party tethering apps that are not available on the app store for example the PdaNet+ app, and jailbreaking or rooting their smartphones to allow the installation of such apps, which make it difficult for CSPs to detect tethering activity. This leads to tethering fraud, where many different unauthorized and uncontracted devices with different private IP addresses disguise themselves as a single public IP address to take advantage of existing mobile data plans, with unlimited plans often being the target.

As data usage overtakes voice and traditional messaging, the pumping of unauthorized data into the network via illegal tethering may cause massive revenue leakages and traffic congestion, resulting in a poor quality of service for other subscribers and poor customer satisfaction. This effect will only worsen with the rising consumption of rich content. Mobile video consumption is expected to increase tremendously as UHD/4K video consumption, online meetings and conferences, live streaming and vertical videos gain popularity. This coupled with the 10.2% year on year growth in mobile gaming2 and the increase in usage of other mobile applications, such as image- and video-heavy social media and instant messaging, will result in subscribers attempting to share much more of their data plan than they are allowed to, causing a considerable downgrade in the quality-of-experience of other users.


How to restrict unauthorized tethering

To prevent such risks and losses, CSPs will require a solution that can track and detect tethering in real-time, and this is where mobile tethering transparency tools come into play. Our mobile tethering detection plug-in for example, identifies network address translation activities and the devices and applications involved in such activities. The plug-in uses heuristic methods such as Google QUIC user agents, Time to Live (TTLs) and TCP timestamps to recognise the devices hiding behind a routing device’s publicly exposed IP address.

The plug-in is an extension of our OEM deep packet inspection (DPI) software R&S®PACE 2 that inspects and classifies IP traffic and extracts metadata. Leveraging this advanced detection and classification engine, the plug-in delivers one of the highest and most accurate traffic classification rate in the industry and is constantly updated to reflect any changes or updates in device operating systems.

The mobile tethering transparency plug-in displays IP traffic analytics in an accessible and flexible manner and provides real-time information, for example, about the number of routing devices and the number of devices tethering from the routing device. Using this information, CSPs can block or slow down the connection of subscribers that are tethering more than what their plans allow and prevent the abuse of their data network.

This visibility is also essential for network management. Network analytics vendors, for example, benefit from incorporating mobile tethering transparency into their network monitoring tools. This facilitates the detection of phantom users and the invisible usage of network resources, and allows actual network issues such as faulty network devices and bandwidth limitations to be separated from issues arising from illegal tethering.

While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, it also allows them to learn about subscriber sharing behaviour and use this to expand their offerings for multi-device subscribers.

References

1. Cisco Annual Internet Report (2018–2023) White Paper ( https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html)

2. The Global Games Market Will Generate $152.1 Billion in 2019 as the U.S. Overtakes China as the Biggest Market ( https://newzoo.com/insights/articles/the-global-games-market-will-generate-152-1-billion-in-2019-as-the-u-s-overtakes-china-as-the-biggest-market/)

Sebastian Müller portrait

Sebastian Müller

Contact me on LinkedIn

Sebastian is a passionate DPI thought leader guiding a cross-functional team to build the networks of the future with leading traffic analytics capabilities. He has over ten years of dedicated experience in the telecom and cybersecurity domain, providing him with deep understanding of market requirements and customer needs. When he’s not at work, you can either find him on his road bike or hiking in the mountains.

Email: Seb.Mueller@rohde-schwarz.com
Stay informed. Subscribe to our newsletter.

For more details about how we protect your privacy and information, please read our privacy policy.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to news.ipoque@rohde-schwarz.com. Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the "Statement of Privacy".

What does this mean in detail?

I agree that ROHDE & SCHWARZ GmbH & Co. KG and ipoque GmbH, a ROHDE & SCHWARZ company may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

两个鬼故事起名 英语宝宝起名字哪家网站好小八戒网仙壶农庄莉亚迪桑喧闹的街唐氏起名大全男孩什么名字好显卡80度余姓怎样起名车行起名人员类别单梁起重机知名厂家玉米人加盟伐竹取道无赖勇者的鬼畜美学带睿字的起名字李紫馨石起起名 男孩桂林起名看电视中医馆起名起名网美名腾起个园林公司名收纳箱团购最强网络神豪魔兽1.20补丁2014年属马女孩起回事名字看同性男AA片宝宝起名打分免费测试生辰八字终焉誓约少年生前被连续抽血16次?多部门介入两大学生合买彩票中奖一人不认账让美丽中国“从细节出发”淀粉肠小王子日销售额涨超10倍高中生被打伤下体休学 邯郸通报单亲妈妈陷入热恋 14岁儿子报警何赛飞追着代拍打雅江山火三名扑火人员牺牲系谣言张家界的山上“长”满了韩国人?男孩8年未见母亲被告知被遗忘中国拥有亿元资产的家庭达13.3万户19岁小伙救下5人后溺亡 多方发声315晚会后胖东来又人满为患了张立群任西安交通大学校长“重生之我在北大当嫡校长”男子被猫抓伤后确诊“猫抓病”测试车高速逃费 小米:已补缴周杰伦一审败诉网易网友洛杉矶偶遇贾玲今日春分倪萍分享减重40斤方法七年后宇文玥被薅头发捞上岸许家印被限制高消费萧美琴窜访捷克 外交部回应联合利华开始重组专访95后高颜值猪保姆胖东来员工每周单休无小长假男子被流浪猫绊倒 投喂者赔24万小米汽车超级工厂正式揭幕黑马情侣提车了西双版纳热带植物园回应蜉蝣大爆发当地回应沈阳致3死车祸车主疑毒驾恒大被罚41.75亿到底怎么缴妈妈回应孩子在校撞护栏坠楼外国人感慨凌晨的中国很安全杨倩无缘巴黎奥运校方回应护栏损坏小学生课间坠楼房客欠租失踪 房东直发愁专家建议不必谈骨泥色变王树国卸任西安交大校长 师生送别手机成瘾是影响睡眠质量重要因素国产伟哥去年销售近13亿阿根廷将发行1万与2万面值的纸币兔狲“狲大娘”因病死亡遭遇山火的松茸之乡“开封王婆”爆火:促成四五十对奥巴马现身唐宁街 黑色着装引猜测考生莫言也上北大硕士复试名单了德国打算提及普京时仅用姓名天水麻辣烫把捣辣椒大爷累坏了

两个鬼故事 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化