The Mobile Network’s Founder and Editor, Keith Dyer, joins Syniverse’s Chief Marketing Officer, Mary Clark, and Senior Solutions Engineer, Leo Casey, this week to help mobile operators better understand the future of roaming and charging settlement for VoLTE.
in these slides you will learn what is roaming and how it is work in simple way also with some signaling to show how the operators work together and how call & SMS routed , billing ,agreement ,
for any information plz contact me (rawand.ali@hotmail.com)
Tel: +9647701105935
The document discusses LTE drive testing and coverage analysis, including factors that influence LTE coverage, methods for identifying weak coverage areas and coverage holes, techniques for resolving imbalances between uplink and downlink coverage, and case studies demonstrating how to address issues like cross coverage, lack of a dominant cell, and inverse antenna connections. Key metrics for evaluating LTE signal quality like RSRP, RSCP, and RxLev are also compared between LTE and earlier mobile technologies.
The document discusses VoLTE optimization services including RAN and EPC analysis using various tools. It details accomplishments like optimizing sites for carriers and analyzing problems like VoLTE drop issues. The key services described are VoLTE parameter audits, drive log analysis, UETR analysis, and end-to-end VoLTE call tracing. Case studies provided examine issues like QCI profile not defined, RRC drops without VoLTE drops, and improvements gained from features like ICIC and parameter changes.
This document provides technical training on optimizing LTE downlink throughput. It discusses:
1. The increasing commercial adoption of LTE networks and rapid growth of LTE users.
2. Challenges in optimizing LTE networks including insufficient analysis capabilities and experience-based adjustments.
3. A proposed optimization scheme involving in-depth analysis of issues like weak coverage, interference and throughput problems to identify root causes and targeted optimization suggestions.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
SRVCC allows a voice call on an LTE network to be handed over to a 2G or 3G network when the user moves out of LTE coverage, ensuring the call does not drop. It uses the STN-SR identity to route the call via the MSC to the IMS network. During the SRVCC handover, the MME splits the voice bearer from other bearers and initiates relocation of the voice bearer to the MSC while relocating other bearers to the SGSN. The MSC then establishes the CS leg with the IMS network using STN-SR to complete the handover without dropping the call.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
in these slides you will learn what is roaming and how it is work in simple way also with some signaling to show how the operators work together and how call & SMS routed , billing ,agreement ,
for any information plz contact me (rawand.ali@hotmail.com)
Tel: +9647701105935
The document discusses LTE drive testing and coverage analysis, including factors that influence LTE coverage, methods for identifying weak coverage areas and coverage holes, techniques for resolving imbalances between uplink and downlink coverage, and case studies demonstrating how to address issues like cross coverage, lack of a dominant cell, and inverse antenna connections. Key metrics for evaluating LTE signal quality like RSRP, RSCP, and RxLev are also compared between LTE and earlier mobile technologies.
The document discusses VoLTE optimization services including RAN and EPC analysis using various tools. It details accomplishments like optimizing sites for carriers and analyzing problems like VoLTE drop issues. The key services described are VoLTE parameter audits, drive log analysis, UETR analysis, and end-to-end VoLTE call tracing. Case studies provided examine issues like QCI profile not defined, RRC drops without VoLTE drops, and improvements gained from features like ICIC and parameter changes.
This document provides technical training on optimizing LTE downlink throughput. It discusses:
1. The increasing commercial adoption of LTE networks and rapid growth of LTE users.
2. Challenges in optimizing LTE networks including insufficient analysis capabilities and experience-based adjustments.
3. A proposed optimization scheme involving in-depth analysis of issues like weak coverage, interference and throughput problems to identify root causes and targeted optimization suggestions.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
SRVCC allows a voice call on an LTE network to be handed over to a 2G or 3G network when the user moves out of LTE coverage, ensuring the call does not drop. It uses the STN-SR identity to route the call via the MSC to the IMS network. During the SRVCC handover, the MME splits the voice bearer from other bearers and initiates relocation of the voice bearer to the MSC while relocating other bearers to the SGSN. The MSC then establishes the CS leg with the IMS network using STN-SR to complete the handover without dropping the call.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
volte ims network architecture tutorial - Explained Vikas Shokeen
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
The document discusses interworking between WCDMA and LTE networks. It describes cell reselection procedures where a UE camping on a UMTS cell can reselect to an LTE cell based on priorities broadcast in system information. The UE performs measurements of LTE frequencies and reselects to a cell with higher priority if thresholds are met. Parameters for controlling cell reselection are configured using managed object models. The document also discusses PS redirections and handovers between the networks.
It’s new and it’s VoLTE, but will consumers notice? VoLTE is a game changer for mobile operators. They can use VoLTE as a jumping off point for new services aimed at delivering high-quality voice and video conferencing services, among others, that rival anything that has come before (3G) or after (OTT). Journalists Monica Alleven and Brad Smith talk to industry experts to find out how network operators are preparing for VoLTE.
The document outlines basic call flows for location updates, mobile originating calls (MOC), mobile terminating calls (MTC), and IP calls. It describes the key steps as:
1) Location update involves identity response, authentication between the SIM and MSC, update location requests, and ciphering.
2) For MOC, the mobile station sends a setup message with the dialed number, the MSC sends a send routing information message to the HLR, and the HLR responds with routing instructions allowing the call to be connected.
3) For MTC, the MSC requests a roaming number from the HLR, the HLR provides a number and the MSC pages the mobile station to alert
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document discusses key planning parameters for TD-LTE including PRACH, PCI, and UL DM RS. It provides details on:
1) PRACH planning including separating PRACH resources by time, frequency, or sequence to reduce interference between cells.
2) Recommendations for selecting PRACH preamble formats and configuration indexes based on cell range.
3) Guidelines for configuring PRACH frequency offset, cyclic shift, and root sequence index based on factors like PUCCH resources and number of preamble sequences needed.
3.oeo000020 lte call drop diagnosis issue 1Klajdi Husi
This document discusses LTE call drop diagnosis. It provides statistics and counters related to abnormal call releases, including those caused by radio network faults, transport network faults, and network congestion. It also discusses call drops related to handover failures, corner effects, and ping-pong handovers. The document emphasizes this is confidential information of Huawei and cannot be shared without permission.
This document provides formulas and proposed targets for key performance indicators (KPIs) related to LTE network monitoring. It includes KPIs for LTE OSS statistics measured at the network level and LTE drive test KPIs measured through field testing. For each KPI, it provides the detailed formula, measurement methodology, and a brief description. The goal is to establish a framework for initial discussion on monitoring LTE network performance.
This document provides an overview of UMTS traffic management and mobility management. It describes the UMTS network architecture including nodes like the RNC, SGSN, GGSN and core network elements. It explains concepts like bearers, radio access bearers (RABs), and radio resource connections (RRC). Mobility management procedures are outlined including location registration, location updating, routing area updates, paging, and roaming between home and visitor networks. Databases like the HLR that store subscriber information and support mobility functions are also detailed.
It is a handbook of UMTS/WCDMA call flows for Handovers.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
The document discusses international mobile roaming, including:
1. The different types of roaming agreements and their lifecycles, from establishing strategies and negotiating terms to testing, implementing, and ongoing monitoring.
2. Key roaming management tasks like internal processes and interfaces with external partners.
3. Common bottlenecks that can occur during negotiation, testing, go-live, and ongoing operations, and ways to avoid them like clear processes, priorities, resources, and potentially outsourcing some functions.
Close coordination is needed across the departments involved to successfully establish and maintain roaming partnerships.
Inter-frequency and inter-RAT handovers can be coverage, load, or service based. Coverage-based handovers are triggered by certain A3/A4/A5 events for inter-frequency and B1/B2 events for inter-RAT. The document discusses the parameters involved in measuring cells and configuring handovers, including measurement reports, handover commands, and key performance indicators for analyzing handover issues. Common causes of handover problems include poor downlink quality, interference, and abnormal X2 interface signaling.
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...Vikas Shokeen
Complete End to End Tutorial on Fundamentals & Basics of VoLTE , IMS Technology & VoLTE Overview ( Voice Over LTE )
- What is VoLTE
- Network Evolution to VoLTE
- How to Enable VoLTE in handset
- Differences between VoLTE & CSFB Call
- Voice call in LTE & VoLTE Networks
- Evolution of Voice Call
- VoLTE - Benefits for Users
- VoLTE - Benefits for Operators
- VoLTE Challenges
- Congestion handling for VoLTE Traffic
This document provides an overview of radio network design for rollouts, including configuration of parameter structures, site configuration, mobility configuration, and neighbors configuration. It discusses organizing parameters into managed object classes with a hierarchical structure. Major sections cover defining radio modules and cells, antenna line configuration, frequency configuration, and adding new objects. Configuration of idle and connected mode mobility parameters and system information blocks is also addressed.
This document outlines the process for mobile originated and terminated calls in 3G networks. It describes the steps for a mobile originating call in 3 parts and a mobile terminated call in 3 parts, including setting up the GTP tunnel for transport. The document breaks down the end-to-end call flows for 3G connections.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
This document describes several 2G and 3G layer 3 messages including their purpose and key information elements. For 2G, it summarizes Sys info types 1-6 which broadcast system information to mobile stations in idle and dedicated modes, including things like channel allocation and cell parameters. It also describes messages like Measurement Report, Immediate Assignment, and Handover Command that are used for handover and connection management. For 3G, it lists 21 different message types like Measurement Report and Active Set Update used for mobility management and connection control.
Lessons Learned: Implementing VoLTE Roaming Syniverse
Keith Dyer, Founder and Editor of The Mobile Network (@tmnmag) and Syniverse (@Syniverse) explore what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
Lessons Learned: Implementing VoLTE Roaming APAC Syniverse
Syniverse (@Syniverse) explores what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
volte ims network architecture tutorial - Explained Vikas Shokeen
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
The document discusses interworking between WCDMA and LTE networks. It describes cell reselection procedures where a UE camping on a UMTS cell can reselect to an LTE cell based on priorities broadcast in system information. The UE performs measurements of LTE frequencies and reselects to a cell with higher priority if thresholds are met. Parameters for controlling cell reselection are configured using managed object models. The document also discusses PS redirections and handovers between the networks.
It’s new and it’s VoLTE, but will consumers notice? VoLTE is a game changer for mobile operators. They can use VoLTE as a jumping off point for new services aimed at delivering high-quality voice and video conferencing services, among others, that rival anything that has come before (3G) or after (OTT). Journalists Monica Alleven and Brad Smith talk to industry experts to find out how network operators are preparing for VoLTE.
The document outlines basic call flows for location updates, mobile originating calls (MOC), mobile terminating calls (MTC), and IP calls. It describes the key steps as:
1) Location update involves identity response, authentication between the SIM and MSC, update location requests, and ciphering.
2) For MOC, the mobile station sends a setup message with the dialed number, the MSC sends a send routing information message to the HLR, and the HLR responds with routing instructions allowing the call to be connected.
3) For MTC, the MSC requests a roaming number from the HLR, the HLR provides a number and the MSC pages the mobile station to alert
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document discusses key planning parameters for TD-LTE including PRACH, PCI, and UL DM RS. It provides details on:
1) PRACH planning including separating PRACH resources by time, frequency, or sequence to reduce interference between cells.
2) Recommendations for selecting PRACH preamble formats and configuration indexes based on cell range.
3) Guidelines for configuring PRACH frequency offset, cyclic shift, and root sequence index based on factors like PUCCH resources and number of preamble sequences needed.
3.oeo000020 lte call drop diagnosis issue 1Klajdi Husi
This document discusses LTE call drop diagnosis. It provides statistics and counters related to abnormal call releases, including those caused by radio network faults, transport network faults, and network congestion. It also discusses call drops related to handover failures, corner effects, and ping-pong handovers. The document emphasizes this is confidential information of Huawei and cannot be shared without permission.
This document provides formulas and proposed targets for key performance indicators (KPIs) related to LTE network monitoring. It includes KPIs for LTE OSS statistics measured at the network level and LTE drive test KPIs measured through field testing. For each KPI, it provides the detailed formula, measurement methodology, and a brief description. The goal is to establish a framework for initial discussion on monitoring LTE network performance.
This document provides an overview of UMTS traffic management and mobility management. It describes the UMTS network architecture including nodes like the RNC, SGSN, GGSN and core network elements. It explains concepts like bearers, radio access bearers (RABs), and radio resource connections (RRC). Mobility management procedures are outlined including location registration, location updating, routing area updates, paging, and roaming between home and visitor networks. Databases like the HLR that store subscriber information and support mobility functions are also detailed.
It is a handbook of UMTS/WCDMA call flows for Handovers.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
The document discusses international mobile roaming, including:
1. The different types of roaming agreements and their lifecycles, from establishing strategies and negotiating terms to testing, implementing, and ongoing monitoring.
2. Key roaming management tasks like internal processes and interfaces with external partners.
3. Common bottlenecks that can occur during negotiation, testing, go-live, and ongoing operations, and ways to avoid them like clear processes, priorities, resources, and potentially outsourcing some functions.
Close coordination is needed across the departments involved to successfully establish and maintain roaming partnerships.
Inter-frequency and inter-RAT handovers can be coverage, load, or service based. Coverage-based handovers are triggered by certain A3/A4/A5 events for inter-frequency and B1/B2 events for inter-RAT. The document discusses the parameters involved in measuring cells and configuring handovers, including measurement reports, handover commands, and key performance indicators for analyzing handover issues. Common causes of handover problems include poor downlink quality, interference, and abnormal X2 interface signaling.
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...Vikas Shokeen
Complete End to End Tutorial on Fundamentals & Basics of VoLTE , IMS Technology & VoLTE Overview ( Voice Over LTE )
- What is VoLTE
- Network Evolution to VoLTE
- How to Enable VoLTE in handset
- Differences between VoLTE & CSFB Call
- Voice call in LTE & VoLTE Networks
- Evolution of Voice Call
- VoLTE - Benefits for Users
- VoLTE - Benefits for Operators
- VoLTE Challenges
- Congestion handling for VoLTE Traffic
This document provides an overview of radio network design for rollouts, including configuration of parameter structures, site configuration, mobility configuration, and neighbors configuration. It discusses organizing parameters into managed object classes with a hierarchical structure. Major sections cover defining radio modules and cells, antenna line configuration, frequency configuration, and adding new objects. Configuration of idle and connected mode mobility parameters and system information blocks is also addressed.
This document outlines the process for mobile originated and terminated calls in 3G networks. It describes the steps for a mobile originating call in 3 parts and a mobile terminated call in 3 parts, including setting up the GTP tunnel for transport. The document breaks down the end-to-end call flows for 3G connections.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
This document describes several 2G and 3G layer 3 messages including their purpose and key information elements. For 2G, it summarizes Sys info types 1-6 which broadcast system information to mobile stations in idle and dedicated modes, including things like channel allocation and cell parameters. It also describes messages like Measurement Report, Immediate Assignment, and Handover Command that are used for handover and connection management. For 3G, it lists 21 different message types like Measurement Report and Active Set Update used for mobility management and connection control.
Lessons Learned: Implementing VoLTE Roaming Syniverse
Keith Dyer, Founder and Editor of The Mobile Network (@tmnmag) and Syniverse (@Syniverse) explore what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
Lessons Learned: Implementing VoLTE Roaming APAC Syniverse
Syniverse (@Syniverse) explores what’s driving the rapid move to VoLTE and what can be learned from the operators and service providers that have already implemented these next generation LTE services for roaming.
The document summarizes discussions from the IMS World Forum in 2014. Key points include:
- SK Telecom's successful VoLTE deployment and challenges with interoperability.
- HKT's plans to deploy VoLTE and the challenges they are facing.
- Views that IMS has become too complex and standards are poorly written.
- A need to simplify deployment and focus on customer services and experiences rather than technical standards.
- Ongoing challenges and complexity with interoperability between IMS networks.
- Trials and deployments of RCS and the slow pace of innovation and adoption.
- The importance of service innovation beyond just VoLTE and RCS interoperability
Mavenir has developed solutions to help mobile operators transition to VoLTE networks from 2G/3G networks. Their VoLTE Interworking Function allows operators to implement Circuit Switched Fallback for VoLTE without requiring upgrades to legacy networks. This improves customer experience and reduces costs. Mavenir's Converged Telephony Application Server further supports the transition to VoLTE while maintaining existing services like SMS and preserving investments in legacy networks. Mavenir's solutions provide an evolutionary path to VoLTE that improves service quality while minimizing additional costs.
The document provides an overview of the interfaces, protocols, and IMS stack used in VoLTE networks. It discusses the control plane and user plane links in LTE networks like S1MME, S5/S8, S10, S11 as well as the control plane links in IMS like Sh, Ro, Cx, Rx. It also summarizes key protocols like SIP, Diameter, SCTP, and UDP and how they are used across the different interfaces in LTE and VoLTE networks. Diagrams are included to illustrate the network domains and protocol stack design.
This document discusses the impact of Voice over LTE (VoLTE) on broadband subscriber systems (BSS). It outlines how VoLTE will require coordination across policy and charging control elements to dynamically manage resources for each VoLTE call. It also notes that VoLTE deployment will significantly increase the number of sessions and signaling traffic that networks must handle. Finally, the document suggests that VoLTE presents both an opportunity and need for mobile operators to upgrade their BSS to ensure they can meet requirements for scalability, reliability and functionality to support new voice services.
The document discusses optimization of Voice over LTE (VoLTE) networks, including planning, implementation, key performance indicators (KPIs), challenges, and testing tools. It provides an introduction to VoLTE and describes the phases of VoLTE deployment. Metrics for analyzing VoLTE performance from terminal logs, traces collected at the Mobility Management Entity (MME), and Wireshark logs are outlined. Finally, flow charts are presented for optimizing VoLTE accessibility, retainability, and mobility based on drive test and operations support system (OSS) statistics analysis.
This webinar discusses how mobile operators can monetize VoLTE and RCS services beyond flat-rate data plans. It covers trends in LTE services, the IMS architecture as the technical foundation, and a MetroPCS case study. The webinar explores opportunities for new services, innovations, and partnerships to generate additional revenue streams. The role of the media resource function in supporting advanced services is also examined.
1) Roaming services face challenges in evolving to meet modern needs due to fragmented frequency band deployments and a lack of customized package and control options. WiFi roaming also has issues around lack of standard handover algorithms and interface definitions.
2) The ITU proposes a new "Ubiquitous Consumer Wireless World" model that separates access and core network providers from authentication providers to create a more seamless global roaming experience not tied to specific operators.
3) While roaming has been successful for operators, regulations and changing usage behaviors require new charging models and tools to help users understand and control roaming costs and experiences. The UCWW model presents an opportunity to re
This document discusses LTE deployment and services, including content management on LTE networks, voice over LTE using IMS networks, dedicated and default bearers, circuit-switched fallback architecture, GSMA standards for RCS services over LTE, and evidence that LTE encourages increased data usage. It also covers macrocells versus small cells, considerations for small cell rollout, and strategies for successful LTE launches.
A webinar session helping mobile operators understand the following concepts:
• What is the difference between VoLTE interconnect and roaming?
• What are the critical steps and components necessary to successfully implement a VoLTE interconnect solution?
• How do Electronic Number Mapping (ENUM), session and policy control, and interworking impact VoLTE interconnect?
• What are other interconnect services – such as ViLTE, SMS-over IP (SMSoIP) and Rich Communications Services (RCS), including Wi-Fi calling – that mobile providers can implement using the IMS framework needed for VoLTE?
This document analyzes the performance of Voice over LTE (VoLTE) based on field measurement data from commercial LTE networks. It evaluates VoLTE performance in terms of real-time transport protocol (RTP) error rate, jitter and delays, block error rate (BLER), and voice quality measured by mean opinion score (MOS). It also analyzes key VoLTE features like robust header compression (ROHC) and transmission time interval (TTI) bundling. Guidelines are provided for optimizing VoLTE deployment based on practical field testing results.
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a preferred choice
for data for human to human (H2H) services and now it is becoming preferred choice for voice also. In
some developed countries the traditional 2G services gradually decommissioned from the service and
getting replaced with LTE for all H2H services. LTE provided high downlink and uplink bandwidth
capacity and is one of the technology like mobile ad hoc network (MANET) and vehicular ad hoc network
(VANET) being used as the backbone communication infrastructure for vehicle networking applications.
When Compared to VANET and MANET, LTE provides wide area of coverage and excellent infrastructure
facilities for vehicle networking. This helps in transmitting the vehicle information to the operator and
downloading certain information into the vehicle nodes (VNs) from the operators server. As per the ETSI
publications the number of machine to machine communication (MTC) devices are expected to touch 50
billion by 2020 and this will surpass H2H communication. With growing congestion in the LTE network,
accessing the network for any request from VN especially during peak hour is a big challenge because of
the congestion in random access channel (RACH). In this paper we will analyse this RACH congestion
problem with the data from the live network. Lot of algorithms are proposed for resolving the RACH
congestion on the basis of simulation results so we would like to present some practical data from the live
network to this issue to understand the extent RACH congestion issue in the real time scenario.
This document provides a summary of key aspects of enabling Voice over LTE (VoLTE) as outlined in the GSMA PRD IR.92 specification. It discusses the motivations and requirements for VoLTE, including subscriber expectations for telephony services and carrier requirements around cost and efficiency. It then reviews various options for delivering VoLTE, including using fixed broadband VoIP solutions, dual-radio "simultaneous voice and LTE" solutions, circuit-switched fallback, and voice over LTE via generic access. The document focuses on the GSMA IR.92 specification, which defines a SIP-based IMS profile for delivering VoLTE in a standardized way. Key aspects of IR.92 covered include
This document discusses various options for enabling voice services over LTE networks, including adopting existing VoIP solutions from fixed broadband, using dual-radio "simultaneous voice and LTE" devices, circuit-switched fallback which switches between LTE and legacy networks for calls, and voice over LTE via generic access which tunnels legacy call signaling over LTE without leaving the LTE network. It notes subscriber requirements like replicated telephony services, quality, and ubiquity, as well as carrier requirements like efficiency, complexity, and cost. The options are evaluated based on factors like support for services, quality of service, battery life, control by carriers, and infrastructure requirements.
This document discusses various options for enabling voice services over LTE networks, including adopting existing voice over IP solutions, using dual-radio devices to support voice on legacy networks simultaneously with LTE data, circuit switched fallback which switches between LTE and legacy networks for voice, and voice over LTE via generic access which tunnels legacy call signaling over LTE without leaving the LTE network. It provides requirements for voice over LTE including supporting existing cellular voice functionality and quality of service for subscribers and minimizing costs and complexity for carriers.
This document discusses various options for enabling voice services over LTE networks, including adopting existing VoIP solutions, using dual-radio devices to support voice on legacy networks simultaneously with LTE data, circuit-switched fallback which switches between LTE and legacy networks for voice, and voice over LTE via generic access which tunnels legacy call signaling over LTE without leaving the LTE network. It covers the requirements, advantages, and disadvantages of each approach.
Long Term Evolution (LTE) 4G is an all-IP standard for high-speed wireless communication. Communication service providers need to evolve to LTE to stay competitive and pursue the next growth curve in broadband. Transitioning to LTE will impact a telco's enterprise systems like the BSS, OSS, and ESS through changes to the network architecture, business rules, billing models, and application landscape. Telcos should analyze the impact on their architecture, identify required system changes, engage vendors, and plan a phased rollout strategy to successfully adopt LTE.
Similar to VoLTE Charging and Clearing Explained (20)
Webinar: Building Brand Trust with MobileSyniverse
This presentation from Syniverse (www.syniverse.com) and mCordis (www.mcordis.com) addresses how brands and mobile operators can address the growing gap between the need to reach consumers with right time, right place, right content mobile services and consumer willingness to provide brands and mobile operators with the personal data required to deliver those services.
The document discusses Syniverse's cloud-based fraud protection services for mobile operators. It highlights that mobile fraud and revenue leakage will cost operators $300 billion by 2016. Syniverse's centralized global fraud intelligence platform collects and analyzes fraud data from over 110 customers to more accurately identify new fraud techniques. The cloud-based system provides faster ROI, less implementation time, lower costs than on-premise solutions, and 24/7 expert support. Recent customer examples demonstrate detecting over 9,000 fraudulent SIMs and preventing over $15 million in losses within 5 months.
Making Mobile Marketing Budgets Count in the Age of Ad BlockingSyniverse
In this webinar, Syniverse’s Rob Hammond (@tech2dollars) and mCordis’s Paul Berney (@paulbmobile) examine the rise of ad blocking tools and the implications for mobile marketers. This presentation explores best-practice examples for optimizing engagement with mobile-first customers.
Paul Berney (@paulbmobile), Managing Partner and Co-Founder of mCordis (www.mcordis.com) joins Syniverse’s Mobile Engagement specialists, Rob Hammond (@tech2dollars) and Jessica Lee (@jessicanl) to discuss the top trends mobile marketers should be paying attention to as they map out their 2016 mobile engagement strategies.
Understanding the Mobile-First Blueprint for Engaging and Protecting Customers Syniverse
Michael Becker (@mobiledirect), Managing Partner and Co-Founder of mCordis (www.mcordis.com) and Rob Hammond (@tech2dollars), Senior Director of Mobile Engagement at Syniverse (www.syniverse.com) present a step-by-step blueprint for building brand trust by engaging and protecting mobile-first customers with mobile context.
Mapping the Mobile First Customer JourneySyniverse
Paul Berney (@paulbmobile), Managing Partner and Co-Founder of mCordis (www.mcordis.com) and Rob Hammond (@tech2dollars), Senior Director of Mobile Engagement at Syniverse (www.syniverse.com) present how the rising influence of the mobile channel is altering the traditional customer journey and what brands can do to enhance engagement with their customers in the mobile moment.
Benchmarking Mobile KPIs & Best Practices Among RetailersSyniverse
The document discusses key aspects of mobile strategies and metrics for retailers in 2015. It identifies the top components of an effective mobile strategy as measuring engagement, focusing on financial KPIs, implementing mobile analytics solutions, and defining clear mobile objectives. Additionally, the document outlines essential mobile KPIs retailers should track, including those related to the top, middle, and bottom of the customer funnel. Finally, it emphasizes the importance of integrating mobile metrics into a holistic omnichannel approach and measuring mobile's impact across the entire customer journey.
• How to get executive buy-in for a mobile strategy that’s more than an app
• How to build an opted-in mobile database
• How to integrate mobile with your current CRM program
Overcome Internal Challenges: Set Up Your Business for Mobile SuccessSyniverse
Rob Hammond, Senior Director Mobile Engagement, presents at Eye for Travel's "Mobile and Innovation Strategies for Travel" in San Francisco, March 2015.
In 2015 It’s All About ‘ME’… Mobile Engagement That Is. Are You Ready?Syniverse
In these slides from our recent webinar with Peggy Anne Salz, Chief Analyst and Founder of MobileGroove, you will discover what mobile engagement really is and how it can enhance your customer loyalty and acquisition strategies; which channels you should incorporate into your mobile engagement strategy and why a cross-channel approach is critical to success; what real-world best practice looks like and how you can overcome barriers to adoption.
According to a new study from the Google Shopper Council, a group of shopper marketing experts, 84 percent of mobile shoppers use their phones to assist them in their shopping while in physical stores.
Mobile is transforming the travel industry by allowing companies to engage with customers at every point of their travel journey. By applying contextual data like location and purchase history, mobile engagement solutions can personalize the customer experience and deliver offers, updates, and communications through the channels they prefer, like SMS, push notifications, and mobile apps. Measuring the effectiveness of mobile programs allows companies to optimize engagement by refining target audiences and increasing revenue through tailored offers that boost customer retention and spending.
Syniverse and MMA Webinar: Empower Customer Engagement with Mobile Context - ...Syniverse
Syniverse and the Mobile Marketing Association (MMA) recently hosted a webinar titled "Empower Customer Engagement with Mobile Context". Expert speakers from MasterCard and Syniverse discussed use cases on how mobile context can be used to mitigate risk and drive deeper, personalized mobile engagement.
EyeforTravel - Syniverse Webinar: "Engaging the Connected Traveler with Omni...Syniverse
Gain valuable insights and real life use cases in a recent webinar titled "Engaging the Connected Traveler with Omni-Channel Communications".
Syniverse Chief Marketing Officer Mary Clark examines how you can engage customers and build loyalty using hyper-personalization -- providing precisely the information they want, when they want it and how they want it.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
VoLTE Charging and Clearing Explained
1. Syniverse Proprietary
1
VoLTE Charging and Clearing Explained
Mary Clark – Chief Marketing Officer, Syniverse
Keith Dyer – Founder and Editor, The Mobile Network
Leo Casey – Senior Solutions Engineer, Syniverse
2. Syniverse Proprietary
2
#VoLTE
VoLTE is on the Rise
430 VoLTE-
capable devices
- GSA
521 operators have
commercially launched LTE
networks
with 560 forecasted by
end 2016
82operators in
43countries have
launched VoLTE
- GSMA
-GSA
146 operators are
investing in VoLTE-
related activities
- GSA
-GSMA
4. Syniverse Proprietary
4
#VoLTE
Keith Dyer, Founder and Editor, The Mobile Network
Founded The Mobile Network in 2013, introducing a new voice to the
media covering mobile network technology
17 years of experience covering the mobile network technology
ecosystem as a journalist and editor
Tracked the development of the VoLTE ecosystem since the beginning
Leo Casey, Senior Solutions Engineer, Syniverse
Responsible for supporting Syniverse’s Connected LTE, Intelligent
Roaming, MVNO, and clearing/billing services
15+ years of project management for roaming, business analytics, and
GSM data clearing
GSMA regional conference presenter
Today’s Expert Panelists
5. VOLTE Roaming: charging
Keith Dyer, Editor, The Mobile Network
www.the-mobile-network.com
keith@the-mobile-network.com
Twitter: @keithdyer
#VoLTE
7. Recap on the story so far
Underlying technical choices:
Home Routing (S8HR)
Easier but some features lacking or challenging:
e.g. lawful intercept, emergency call, SRVCC
Local Breakout (LBO)
Technically more challenging, but more complete
operator control
#VoLTE
8. Choices: impact on charging
Underlying technical choices: impact on charging
Home Routing (S8HR)
Can only rate on per kb consumed by voice call
If call drops or falls back - what then?
Local Breakout (LBO)
Signalling changes between home and visited gateways
Keeps current charging model, esp for inbound
Architecture = Charging Capability = Business Model Impact
#VoLTE
9. What are operators thinking? 1/2
Roaming architecture choices:
Home Routing (S8HR) Clear favourite for early movers so far, but some do NOT
like & Local Breakout (LBO) has support for future.
“Only LBO will allow us to meet regulatory, business and customer experience
expectations… We have started to test LBO Home routed architecture with no
significant network issues.” (Operator “A”)
“LBO has been trialled and failed by a few operators. Another major network
has specifically asked us to implement S8HR so that’s what we’re going to do as
part of this request. Ultimately we’ll probably need to support this and then in
the future enable LBO as well” (Operator “B”)
#VoLTE
10. What are operators thinking? 2/2
...about how charging and clearing will work for VoLTE Roaming?
“We’ll make it work” vs “Is it worth the hassle”
“At the wholesale level, both LBO and
S8HR allow charging and settlement
based on current contracts.”
“LBO allows consistent charging for
customers on all technologies while
S8HR will require enhancements from
both IMS and EPC networks to allow
this consistent charging.”
“S8HR will probably result in significant
decrease of value without changing
current charging principles.”
“There is tons of work involved in enabling
S8HR Outbound Roaming in order to do
Customer Charging correctly”
“It’s impossible to relate volume to minutes
or data CDRs to a call duration.”
“S8HR: Offers virtually no advantage over
a CS voice call but gives many
disadvantages.”
#VoLTE
11. EU roam like home?
Is there any impact of EU roam like home regulations
on charging methodology?
NO!
● No anticipated difference in terms of actual way billing is
done. Still need to identify session/call and charge/settle
accordingly.
“None of the main VoLTE aspects are expected to change
as a result of new EU regulation.”
#VoLTE
12. Conclusions
Still split but if pressed S8HR now (no choice due to
commercial relations) and LBO later
Operators not totally uniform on how choice impacts charging
Access to required charging data also seen as challenge
Knock-on impact is on business models
Time to understand implications is NOW
#VoLTE
13. Syniverse Proprietary
13
#VoLTE
S8HR LBO Hybrid
Undecided
I don’t
know
If You Are Planning to Launch VoLTE Roaming,
What Roaming Architecture Do You Plan to
Implement ?
14. Syniverse Proprietary
14
#VoLTE
VoLTE Charging and Clearing Explained
Evolution towards
All-IP/IMS
New and Legacy
Network Technologies
Technical and
Process Changes
for Charging
VoLTE Charging
and Clearing
Principles
Different VoLTE
Implementations
S8HR and LBO
15. Syniverse Proprietary
15
#VoLTE
Evolution of TAP Events
CS TAP CDRs
Mobile Originating Call MOC
Event for Voice and SMS-MO
(only used for 2G , 3G Traffic)
Mobile Terminating Call (MTC)
Event for Voice and SMS-MT
(only used for 2G , 3G Traffic)
Supplementary Service (SS)
Event in association with Voice
Service
GPRS TAP CDR
GPRS Event for data bearer
stream (2G , 3G , LTE Traffic)
VoLTE TAP CDRs
Mobile Session – MSESS
(only used for Voice Traffic
over LTE)
Messaging Event – MSG
(only used for SMS Traffic
over LTE )
2G – 3G 4G
16. Syniverse Proprietary
16
#VoLTE
A single VoLTE call must be represented in a single
Mobile Session (MSESS) TAP Call Detail Record (CDR) in
the same manner like the case with Voice over Circuit
Switch (CS). It is not allowed to present partial VoLTE
Calls separately on TAP.
VoLTE Traffic is not allowed to be represented in CS
MOC and CS MTC Events on TAP
CS Voice and SMS Events are not allowed to be
represented in MSESS and MSG Events on TAP
VoLTE S8HR is volume based charging data service:
Using the existing GPRS call record in TAP
Charges can be differentiated by QoS Class Identifier
(QCI) and also by APN as any other data usage
Signaling (QCI5) can also be separated from payload
traffic (except for SMS)
VoLTE has been supported since TAP3.12,
May 1, 2012
VoLTE Principles
18. Syniverse Proprietary
18
#VoLTE
TAP for Voice Over LTE
TAP support for LTE/IMS (TAP3.12)
Two new TAP records for VoLTE
Messaging event (MSG)
Mobile session (MSESS)
New TAP fields in two new records
New type of roamer
New type of destination
New recording entity code/type:
9:P-CSCF
Technical and Process Changes
for Charging
TAP Challenges for VoLTE
No single network element will
contain all charging elements
Correlation of data from
SGSN/S-GW/P-CSCF
CDRs via common Charging ID
Charging ID available from P-CSCF
to identify each unique call
Not all “usual” TAP information
readily available
Charging only for service and not
for service + bearer (may not be
straightforward)
19. Syniverse Proprietary
19
#VoLTE
Voice and SMS in CS vs. LTE
Item CS LTE
User Identities
IMSI
MSISDN
IMSI complimentary with Private User ID
Public User ID
Origination /
Destination
E.164 Number E.164 Number , SIP URI, Tel URI
CDR Source MSC SGSN , S-GW , P-GW , P-CSCF, ATCF, TRF
CDR Correlation Not Required
Required by using the Charging ID present in the EPC
& IMS Domain
CDR Unique
Identifier
Call Reference &
SMS Reference
IMS Charging Identifier
TAP Record
MOC /MTC
SMS-MO/SMS-MT
MSESS + Messaging Service
MSG +Messaging Event Service
GPRS(S8HR)
21. Syniverse Proprietary
21
VoLTE (S8HR) Home Routed Architecture
Advantages
S-GW is the main source for charging information
Basic bearer data volume charging
No technical complexity where handovers are not involved
QCI mechanism is used to identify VoLTE calls
TAP Charging capabilities are already present
CAPEX/OPEX is low for wholesale billing
Challenges
Non-granular mechanism to charge and identify single
VoLTE calls
No service awareness for services used on the VPMN side
Aggregation/Charging for VoLTE handover scenarios with
3G/4G are complex
Duration-based charging for VoLTE will be complicated
Correlation of charging information between VPMN and
HPMN is difficult
IPX
IPX
E-UTRAN
MME
VPMN A-Party HPMN A-Party
B-Party
HSS
P-CSCF
S-CSCF
TAS
SGW
DRA
IBCF
VoLTE
Roaming
Interconnect
IMS
IMS
Exchange
PCRF
PGW
22. Syniverse Proprietary
22
#VoLTE
LTE Data Bearers – S8 Home Routing
QCI = 5
QCI = 1
QCI = 2 Video Media - Dedicated Bearer
Application Servers
IMSAPN
LTE Bit
Pipe
Voice Media - Dedicated Bearer AS
AS
IMS
HPMN
Signaling - Default Bearer
QCI Values TAP Values
Value
QCI
Priority Description
CTL2
Value
Record
Type
APN
1 2 Conversational Voice 21 GPRS IMS
2 4 Conversational Video (Live Streaming) 22 GPRS IMS
5 1 IMS Signaling (Voice, Video, SMS) 25 GPRS IMS
PDN-GW
S-GW
VPMN
23. Syniverse Proprietary
23
#VoLTE
Signaling and media anchored in
home network
No IMS accounting records sent
from visited to home network
Records generated in home network
IMS accounting records not available
on visited network
Visited network only has visibility
into bearer accounting
QoS, bearer usage
TAP billing records sent to clearing
house for bearer data usage
No change from GPRS settlement
process however the VPMN may
decide to differentiate charging
based on QCI values
Accounting Flow S8 Home Routing
Billing
Domain
Billing
Domain
Access
Network
Visited
Network
Home
Network
Clearing
House
Bearer
Accounting
Offline
Charging
System
S-GW PDN-GW
Offline
Charging
System
Online
Charging
System
(Prepaid)
IMS Accounting
TAP
P/I/S-CSCF
IMS
25. Syniverse Proprietary
25
VoLTE (LBO) Local Breakout Architecture
IPX
IPX
xCSCF
MME
VPMN A-Party HPMN A-Party
B-Party
HSS
P-CSCF
S-CSCF
TAS
IBCF
DRA
IBCF
VoLTE
Roaming
VoLTE
Interconnect
EPC
IMS
IMS
IMS
Exchange
IMS
Exchange
PCRF
IBCF
Advantages
More visibility into the control and media plane aspects of a
call or video session as it’s taking place with IMS
Full support for lawful intercept and emergency call handling
SRVCC support continuity of a voice call when moving between
LTE and CS networks
VPMN has visibility of the call information using their IMS
records, TAP records can be created to reflect MOUs. This
makes it possible to use TAP for retail billing
Challenges
More complexity implementing and supporting VoLTE roaming
Interoperability issues that must be resolved between IMS cores
Requires multiple feeds from many network elements for both
visited and home operators
Operators may choose to implement home routing for data, but
local breakout for voice, adding complexity
The TAP 3.12 MSESS & MSG records need to be supported by
both roaming partners
26. Syniverse Proprietary
26
LBO Roaming Scenarios
VPMN Routed HPMN Routed
TAP Event Network Source
MSESS CDR TRF Network CDR
TAS
S-CSCF
Destination
TrGW
VPMN
HSS
IBCF
IBCF
TRF
IC Provider
IC Provider
IBCF
P-CSCF
PGW
IC Provider Control
Media
TAS
S-CSCF
Destination
TrGW
VPMN
HSS
IC Provider
IC Provider
IBCF
P-CSCF
PGW
IC Provider
Control
Media
HPMN HPMN
TrGW
IBCF
IBCF
TAP Event Network Source
MSESS CDR P-CSCF Network CDR
27. Syniverse Proprietary
27
#VoLTE
VoLTE Call – MSESS TAP CDR
General
APN
IMS Domain
ATCF Network CDR
Called Number Address
Subscription ID
IMS Charging Identifier (ICID 1)
Service 1 (Voice)
Media Component 1
Charging ID 1
Service 2 (Video)
Media Component 2
Charging ID 2
IMS APN
PDP Context 3 (Internet Access) – Charging ID 3
PDP Context 2 (Video) – Charging ID 2 – (ICID 1)
PDP Context 1 (Voice) – Charging ID 1 – (ICID 1)
S-GW P-GW
LTE EPC Core
External Packet Data Network
TAP MSESS CDR
IMSI
MSISDN
Location Info.
28. Syniverse Proprietary
28
#VoLTE
Bearer accounting records optionally sent from visited to home network
IMS accounting records generated by visited P-CSCF and home S-CSCF
Diameter interfaces to offline and online charging systems
TAP billing records may be sent to clearing house to support legacy settlement and retail billing processes
IPX provider has access to IMS accounting records
LTE Accounting Flow Local Breakout
IMS Services
Visited Network Home Network
TAP
IMS IMS
Bearer
Bearer Accounting
IMS Accounting
IPX
Proxy
IPX
Provider
Offline/Online
Charging System
Billing
Domain
Access
Network
Clearing
House
PDN-GW
Billing
Domain
Offline
Charging
System
S-GW
P-CSCF I/S-CSCF
29. Syniverse Proprietary
29
#VoLTE
LTE and the evolution to an all IP-based
network represents new challenges and new
opportunities
TAP has evolved to support VoLTE roaming, but
not all TAP records are being used at this time
Multiple network routing scenarios bring
different advantages and challenges to
charging and clearing
S8HR is most widely used VoLTE routing
scenario in use today
While the information is not as granular for
wholesale charging and clearing, options are
available to identify and charge for it
Roaming and financial teams need to work
closely with their network engineering teams
to understand which routing scenarios they’re
using and what information is available to
them for charging and clearing
Webinar Recap
VoLTE charging and clearing can be complex, but not impossible.