Case Study: Transforming Legacy Telecoms Networks

Simon Brueckheimer


Subscribe Contact us

It is no exaggeration that telecommunications operators worldwide retain an abundance of ‘legacy’ networks: those using decades-old technologies for which support and maintenance contracts, software updates and hardware parts have already ceased to be available.


Legacy networks become increasingly expensive to maintain as they age: a dwindling source of parts requires pricey refurbishment of the old, a situation exacerbated by accelerating failure rates causing network and service outages, and even liquidated damages to be paid.


These networks should have been retired long ago. However, that they still garner significant revenue, directly and indirectly from the millions of services and other networks they transport – business voice, data, mobile access and core, emergency services, control and signalling – such that continuing worth demands some sort of technology transformation.


After all, proprietary and dated tools, and manual processes associated with them, can be transformed alongside, to technologies such as Software-Defined Networking (SDN) and virtualised networks that are highly automated.


So, what stands in the way of that transformation? The cost of maintaining the legacy network should outweigh the cost of transforming them, but it is not that straightforward unfortunately. Cost, risk and feasibility prove to be a very complex and circular interaction, and that is what has held back such investment, even by the most resourceful of operators.


3 Problems


Three factors dominate their dilemma:


  1. Employees familiar with legacy technologies and their arcane proprietary management tools, are a diminishing proportion of the workforce. As they retire year on year, that undermines confidence, to the extent that the problem is thought best left alone

  2. Service and billing records and the actual network configuration - the so-called back-office - is data generally only in partial agreement with each other, incomplete, and not always an accurate reflection of reality. Sometimes this data is not available – older nodes can fail management communications – or are in difficult-to-consume formats. Without a reconciled and complete view, no one really knows if transformation is feasible, let alone how to conduct it reliably.

  3. Selecting the starting point is critical to success, but even with a clear big-picture strategy, so many detailed considerations and constraints contrive to make this far from obvious. Evaluating many, occasionally opposing, tactics and a myriad of interplays (customer, control, in-building services, physical distributions and virtual protections), must be confected – almost magically – into an effort, spend and recovery efficient roll-out that also mitigates all risks.


The Challenge


A large NA telecom local and long-distance operator had an established business case and strategy for transformation, but no longer had a planning team with the modelling capability to do so. Their scheduled goal was behind by years, so they sought to source an outside ‘Planning Tool and Service’ and select parts of their network to which it should be applied to meet their priorities.


LightRiver, a well-established services supplier with advanced monitoring and management tools already deployed in their network, were awarded the contract. 


“Despite our accurate inventory of circuits and assets, we needed a partner that could process tens of millions of lines of data, and build a system to manipulate, sequence, and display the data in a way that was consumable and actionable. Cambridge MC was the perfect partner for us. Their tools and dashboards allow us to change the project sequence depending on the customer’s specific needs in each different area of the network.” 


– Matt Briley, SVP Global Sales & Solutions, LightRiver


The Approach


Our first step was to dispense with the original piecemeal focus on parts of the network, and analyse the whole: big data for deep insights. That revealed ‘simple’ transformations: those without ramifications for other regions, services or networks, and thereby avoid creating a large backlog of implementation work.


That simplicity had to be quantified, to be credible and satisfy the operator’s priorities. We invented a novel ranked evaluation methodology to combine circa 25 complex and often diametrically opposing metrics. This yielded stepwise transformations that were well (but not critically) sequenced, such that dismantling the network became progressively simpler.


Our Data Science and ML were also used to combine back-office records with actual network configuration data from LightRiver’s netFlex platform, reconciling information and filling in blanks, to provide for the first time an accurate and complete view to direct implementation and mitigate risks.


Our automated ‘planning’ process could be conducted in whatever scope, scale and sequence of priorities the operator needed.


Outcomes


The plans produced enabled the operator to:


  1. Discover empty resources that could be powered down without any procurement.

  2. Determine the value of recoverable parts, that turned out 5x greater than anticipated, including previously untrackable inventory.

  3. Determine opportunity clusters like whole-site transformations, avoiding repeat site visits boosting field engineering efficiency.

  4. Recover their schedule to the extent that legacy products earmarked for 2025 could be conducted in 2024.
DOWNLOAD CASE STUDY

Get in touch with Our Consultants today


Contact - LightRiver Case Study

Subscribe to our Newsletter

Blog Subscribe

SHARE CONTENT

Two blocks of data with bottleneck inbetween
by Paul Brooker 29 October 2025
Read our article on hidden complexity and find out how shadow IT, duplicate tools and siloed buying bloat costs. See how CIOs gain a single view of IT spend to cut waste, boost compliance and unlock 5–7% annual savings | READ FULL ARTICLE
Neon 'Open' sign in business window
by Tom Burton 9 October 2025
SMEs make up 99% of UK businesses, three fifths of employment, over 50% of all business revenue, are in everyone's supply chain, and are exposed to largely the same threats as large enterprises. How should they get started with cyber security? Small and Medium sized Enterprises (SME) are not immune to the threat of cyber attacks. At the very least, if your business has money then it will be attractive to criminals. And even if you don’t have anything of value, you may still get caught up in a ransomware campaign with all of your data and systems made inaccessible. Unfortunately many SMEs do not have an IT team let alone a cyber security team. It may not be obvious where to start, but inaction can have significant impact on your business by both increasing risk and reducing the confidence to address new opportunities. In this article we outline 5 key questions that can help SMEs to understand what they need to do. Even if you outsource your IT to a supplier these questions are still relevant. Some can’t be delegated, and others are topics for discussion so that you can ensure your service provider is doing the right things, as well as understanding where their responsibilities stop and yours start. Q1: What's Important & Worth Defending Not everything needs protecting equally. In your personal life you will have some possessions that are dear to you and others that you are more laissez-faire about. The same applies to your digital assets, and the start point for any security plan needs to be an audit of the things you own and their importance to your business. Those ‘things’, or assets, may be particular types of data or information. For instance, you may have sensitive intellectual property or trade secrets; you may hold information about your customers that is governed by privacy regulations; or your financial data may be of particular concern. Some of this information needs to be protected from theft, while it may be more important to prevent other types of data from being modified or deleted. It is helpful to build a list of these assets, and their characteristics like the table below:
Illustration of EV sensor fields
by Duncan Clubb 25 September 2025
Explore the rise of edge AI: smaller data centres, faster networks, and sustainable power solutions. See why the future of digital infrastructure is distributed and intelligent | READ FULL ARTICLE
A close-up of the Downing St sign
by Craig Cheney 19 September 2025
Craig Cheney | The conversation around artificial intelligence (AI) in Government has shifted in recent years. The publication of the UK Government’s AI Playbook represents more than just updated guidance — it signals a huge shift in the government's approach to AI.
Volcano lava lake
by Scott Armstrong 18 September 2025
Discover why short-term thinking on sustainability risks business growth. Explore how long-term climate strategy drives resilience, valuation, and trust | READ FULL ARTICLE
Close up of electricity pylon
by Duncan Clubb 17 September 2025
The UK’s AI ambitions face gridlock. Discover how power shortages, costly electricity, and rack density challenges threaten data centre growth – and what’s being done | READ FULL ARTICLE
Abstract neon hexagons
by Tom Burton 17 September 2025
Delaying cybersecurity puts startups at risk. Discover how early safeguards boost investor confidence, customer trust, and long-term business resilience | READ FULL ARTICLE
More posts