TRECS© (Total Roamer Control Exchange System)

TRECS© (Total Roamer Control Exchange System)

TRECS is comprehensive Roamer Management and Exchange Solution utilized for connecting OSS & Billing Systems, validating the input/output of these systems, and as an engine for Wireless Roaming Data Clearinghouse services. TRECS allows any mobile operator to substantially amplify the efficiency (and consequently, the revenue-harnessing capability) of their Network and related OSS & Billing System(s). Utilized by leading Mobile Operators, OSS & Billing Services Providers and Clearinghouses, TRECS is a proven market leader.

As a Clearinghouse engine, TRECS facilitates the management of CDMA CIBER and GSM TAP files for validation, exchange and settlement based upon CIBERNET and/or GSMA TADIG standards. As an OSS & Billing component, TRECS both protects and connects billing systems. TRECS specializes in both inter-carrier and intra-carrier services for voice and data clearing & settlement as well direct-connect & settlement.

The design of TRECS is based upon the expertise of TSS in mediation, rating, billing and clearing & settlement. Some of the key aspects of the design are based upon the following factors.


  • UNIX based open architecture for processing and performance to deliver high throughput with real-time, near real-time and/or batch processing capabilities.
  • Rules-based configuration capabilities for administration with “plug and play” components as needed to quickly address business and technical requirements.
  • Comprehensive Clearinghouse validation, exchange and settlement service capabilities.
  • Ability to process CIBER, TAP-1, TAP-2/TAP-2+, TAP-3, NAIG-TAP and proprietary record/file formats for validation based upon industry standards with forward/backward compatibility.
  • End-to-end automation with ability to provide alerts when intervention is required.
  • Robust edit and validation capabilities to maximize revenues and protect against revenue loss.
  • Rules-based capabilities to manage and automate the process of securely distributing files to the operator’s ARP (authorized receipt point) or roamer exchange partner.
  • Comprehensive security including encryption with state-of-the-art auditing practices.
  • Ability to provide pack level and message level corrections.
  • User-friendly, point-and-click on-line features including file/message/record level error corrections.
  • Ability to store information for fast, efficient retrieval as well as data warehouse services.
  • Daily, monthly and on-demand reporting and extract files including XLS and PDF formats.


  • Validation: Comprehensive edits & validation of network usage in CDMA CIBER, GSM TAP and proprietary transaction/file formats based upon industry standards.
  • Data Exchange: Management of incoming and outgoing files through configurable distribution capabilities.
  • Pack (Batch) level verification: Pack-level editing in “near real-time” or by scheduling.
  • Record level edits: Record level editing to ensure valid values exists in each of the individual record types.
  • Multiple record-type processing: Ability to service multiple record-type processing needs.
  • Duplicate record recognition: A file is kept of all records that are considered valid for use in duplicate record checking, rejection and error reporting.
  • Returns processing: Records are returned according to CIBER and TADIG standards.
  • Online error correction: Packs and records that fail edits are placed in a correction data set.
  • Negative file processing: Calls are rejected that are made by roamers or Electronic Serial Number (ESN/MEID)/Mobile Identification Number (MIN) combinations as specified.
  • High usage reporting (fraud detection): A daily charge total is kept for each customer for comparison to the threshold limit. The high usage thresh hold is a warning flag for the detection of possible fraud.
  • Net settlement: The net revenue value is forwarded to a financial institution or inter-carrier clearing partner for electronic funds transfer.
  • Data privacy: For system level security, security features including encryption for each platform to provide an external layer of data privacy.
  • Application security: At the application level, the TRECS software maintains password security at the primary screen and down at the user level.
  • Internal auditing: Each step of the internal process generates auditing data records. These are used for verification of data sent/received and net settlement.
  • Online administrative functions: Control and administrative updates are performed using online customer database maintenance.
  • Customized file generation: TRECS provides the ability to generate files with customized contents. This is primarily used for off-site data exchange.
  • Report generation: Standard files can be downloaded to a server for production of customized reports. Many analysis functions rely on a high performance/low cost query function capacity.
  • Analytics and Trending: TRECS uses large volumes of historical data to enable trend analysis and forecasting.
  • Pre-defined reports: Standard reports may be pre-defined for examination of subsets of data. These are recurring reports, which assist in the performance of routine control functions.
  • What-If reporting: Allows you to set up scenarios to evaluate the effects of decisions. Assessing different alternatives is now possible with the collaboration of large data volumes and powerful data engines.
  • Currency exchange and conversion calculations: TRECS allows the customer to conduct business with partners who use a different currency and provides currency conversion capabilities.
  • Data warehousing: Large databases enable the use of data warehousing techniques.
  • CIBER/TADIG format conversions: The conversion of all valid record types provides for the transmutation of data between CIBER, TAP-1, TAP-2, TAP-3, and NAIG-TAP formats with forward/backward compatibility features.
  • Disaster recovery planning: TRECS can be utilized to support disaster recovery.


Based on operator volumes, the system can be configured through the use of threads and servers. Each server can support up to 8 threads for processing. Each thread can be configured to process one large operator or many small operators. In addition, the system can be configured with multiple servers (clustering) and each of those servers support up to 8 threads.

Given this configuration (clustering and multiple threading), if any clustered server fails, the processing will switch to another server for completion. Ultimately, the cluster of servers also serves as the disaster recovery feature.

Estimated processing power per thread is 10,000 records per second. Multiplying that by 8 threads equals 80,000 records per second per server. The system performance per hour would be 288,000,000 records per server.