The document describes the call flow process for interworking between an IP Multimedia Subsystem (IMS) network and a public switched telephone network (PSTN). It involves elements like the P-CSCF, I-CSCF, S-CSCF, HSS, MGCF, and MGW. The call flow shows the signaling exchanges between these elements for originating and terminating call scenarios between the IMS and PSTN networks.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
Unlike previous 3GPP wireless technologies, LTE has no Circuit Switched (CS) bearer to support voice, so carrying voice over LTE requires a migration to a Voice over IP (VoIP) solution. Until this migration occurs, LTE-capable handsets need to revert to 2G or 3G for voice calls, which can reduce quality or even suspend Packed Switched (PS) services. The GSMA's IP Multimedia Subsystem (IMS) Profile for Voice and SMS document, commonly referenced as Voice over LTE (VoLTE), defines the mandatory set of features that the mobile device and network are required to implement in order to guarantee an interoperable, high quality IMS-based telephony service over LTE. The course focuses on VoLTE services, underpaying IMS architecture, basic procedures and their impact on existing operator infrastructure. The intermediate solutions like CSFB and SMSoSGs are also explained as they can be used concurrently with VoLTE to support roaming subscribers and emergency calls as long as the operator is not ready to move those service to VoLTE.
Cisco Live! :: Deploying SIP Trunks with Cisco Unified Border Element (CUBE/v...Bruno Teixeira
This session will provide an in-depth understanding on how to design and implement SIP Trunks with Cisco's Enterprise SBC and Cisco Unified Border Element (CUBE/vCUBE). It will familiarise participants with CUBE architecture, deployment options, and sizing guidelines. Differences between various CUBE and vCUBE platform options will also be discussed along with certain key elements of CUBE/vCUBE like Interworking, Media Manipulation, SIP Normalisation, Simplified Call Routing, Call Recording Architectures (ORA, NBR and SIPREC), Multi-tenancy and High Availability.
PLNOG 13: P. Kupisiewicz, O. Pelerin: Make IOS-XE Troubleshooting Easy – Pack...PROIDEA
Piotr Kupisiewicz – Technical Expert in Krakow’s TAC VPN team. In IT for more than 10 years, out of which 5 years is mostly software engineering experience. Last 5 years spent mostly in networking area interested mostly in Network Security. His hobby are drums and very heavy music. CCIE Security 39762.
Olivier Pelerin – as a key member of the escalation team at Cisco’s Technical Assistance Center, he handles world-wide escalations on VPN technologies pertaining to IPSEC, DMVPN, EzVPN, GetVPN, FlexVPN, PKI. Olivier has spent years troubleshooting and diagnosing issues on some of largest, and most complex VPN deployments Olivier have a CCIE in security #20306
Topic of Presentation: Make IOS-XE Troubleshooting Easy – Packet-Tracer
Language: English
Abstract: “IOS-XE is operating system running on Service Provider devices like ASR series and ISR-4451. Aim of this session is to show how very complicated Service Provider’s configurations can be easily troubleshoted using packet-tracer tool.”
Deploying SIP Trunks with Cisco Unified Border Element (CUBE/vCUBE) Enterpriseabdoulr
This session will provide an in-depth understanding on how to design and implement SIP Trunks with Cisco's Enterprise SBC and Cisco Unified Border Element (CUBE/vCUBE). It will familiarize the participant with CUBE architecture, deployment options, and sizing guidelines. Differences between various CUBE and vCUBE platform options will also be discussed along with certain key elements of CUBE/vCUBE like Interworking, Media Manipulation, SIP Normalization, Simplified Call Routing, Call Recording using SIPREC, Multi-tenancy and High Availability.
FPGA implementation of an Adaptive Noise Canceller (ANC)Hocine Merabti
In this project, students learn how to design the LMS algorithm using VHDL. The adaptive noise cancellation problem is used as a test application. Hardware drivers for the SSM2603 codec are provided, along with Matlab codes used to emulate the acoustic environment and generate audio files.
Application Visibility and Experience through Flexible NetflowCisco DevNet
The world of applications is changing rapidly in the enterprise; from the way applications are increasingly hosted in the cloud, the diverse nature of apps and to the way they are consumed by many devices. The need for organizations and network administrators is to focus on "Fast IT" - "Innovation in the Enterprise" is growing, which means having to spend less time on daily operations, maintenance and troubleshooting and more time on delivering business value with newer services. Cisco AVC with its NBAR2 technology is designed to detect applications and measure application performance through measuring round trip time, retransmission rates, jitter, delay, packet loss, MoS, URL statistics etc. Those details are transmitted using Flexible Netflow/IPFIX, so partners could leverage the data for application usage reporting, performance reporting and troubleshooting application issues to deliver best possible application experience.
Watch the DevNet 2047 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92664&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Squire Technologies: Media Gateway Controller Function Presentation.
The SVI_MGCF Media Gateway Controller Function provides a gateway between traditional Circuit Switched SS7 networks and next generation IMS networks such as LTE/ VoLTE.
The SVI-MGCF provides a fully 3GPP compliant Media Gateway Control Function extending Squire Technologies existing SVI-MGC SS7 Media Gateway Controller product utilising the rich heritage of functionality developed over 10 years of global deployment.
The SVI-MGCF provides conversion between SS7-ISUP signalling, SIP-I, SIP-T and traditional and IMS compliant SIP using H.248 MEGACO to control media gateways and DIAMETER to record charging information.
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneMorag Hughson
Every MQ infrastructure team member has been asked this question, and most developers who have worked with MQ have asked it: "Where is my message?" In this session, we look into the tools that MQ provides to find your messages. We show how to analyze the MQ recovery log on distributed platforms to find out what happened to your persistent messages, with the assistance of a new tool. We also look at how to trace the route messages take through your MQ infrastructure, and how to generate and analyze activity reports showing the behavior of MQ applications.
Squire Technologies: Media Gateway Controller Presentation.
The SVI_MGC SS7 Media Gateway Controller enables SS7 on leading VoIP Media Gateways using industry based standards – MGCP, MEGACO H.248, SIGTRAN, SIP, SIP-I, SIP-T and H.323.
The SVI_MGC Media Gateway Controller enables clients to interface their VoIP networks to SS7 PSTN based telephone networks allowing the rapid launch of VoIP services, NAS Modem Dial-Up, distributed networks etc.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
15. The media stream capabilities of the destination are returned along the signalling path, per the S-S procedures;
16-17. MGCF initiates a H.248 command to modify the connection parameters and instruct the MGW to reserve the resources needed for the session.
25. Terminating end point responds to the Response Confirmation. If Optional SDP is contained in the Response Confirmation, the Confirmation Acknowledge will also contain an SDP response;
26-27. MGW reserves the resources needed for the session.
28. When the resource reservation is completed, MGCF sends the successful Resource Reservation message to the terminating endpoint, per the S-S procedures.
32-35. Terminating end point responds to the successful media resource reservation;
36-39. The destination endpoint may optionally perform alerting. If so, it signals this to the originating party by a provisional response indicating Ringing. This message is sent to MGCF per the S-S procedure;
40. If alerting is being performed, the MGCF forwards an ACM message to PSTN.
32-35. Terminating end point responds to the successful media resource reservation;
36-39. The destination endpoint may optionally perform alerting. If so, it signals this to the originating party by a provisional response indicating Ringing. This message is sent to MGCF per the S-S procedure;
40. If alerting is being performed, the MGCF forwards an ACM message to PSTN.
41-44. When the destination party answers, the terminating and S-S procedures result in a SIP 200-OK final response being sent to MGCF;
45. MGCF forwards an ANM message to the PSTN.
46-47. MGCF initiates a H.248 command to alter the connection at MGW to make it bi-directional.
48-51. MGCF acknowledges the SIP final response with a SIP ACK message.
52. PSTN party hangs up, which generates an ISUP REL message to the MGCF;
53. The MGCF sends a Hangup (Bye message in SIP) to the S‑CSCF to notify the terminal that the far end party has disconnected;
54. The MGCF notes the reception of the REL and acknowledges it with an RLC. This is consistent with the ISUP protocol;
55. The MGCF requests the MGW to release the vocoder and ISUP trunk using the H.248/MEGACO Transaction Request (subtract). This also results in disconnecting the two parties in the H.248 context. The IP network resources that were reserved for the message receive path to the PSTN for this session are now released. This is initiated from the MGW. If RSVP was used to allocated resources, then the appropriate release messages for that protocol would be invoked here;
56. The MGW sends an acknowledgement to the MGCF upon completion of above step;
57-58. The S‑CSCF invokes whatever service logic procedures are appropriate for this ending session;
59. The S‑CSCF forwards the Hangup to the P‑CSCF. The P‑CSCF/PCRF removes the authorization for resources that had previously been issued for this endpoint for this session. This step also results in a release indication to the IP‑CAN to confirm that the IP bearers associated with the UE#2 session have been deleted;
60. The P‑CSCF forwards the Hangup to the UE.
61. The terminal responds with an acknowledgement, the SIP OK message (number 200), which is sent back to the P‑CSCF. The IP network resources that had been reserved for the message receive path to the endpoint for this session are released, taking into account the bearer establishment mode used for the IP‑CAN session.
62. The SIP OK message is sent to the S‑CSCF.
63. The S‑CSCF forwards the message to the MGCF.
The MGCF in the IM CN subsystem is a SIP endpoint that initiates and receives requests on behalf of the PSTN and Media Gateway (MGW).Other nodes consider the signalling as if it came from a BGCF (S‑CSCF).
Procedures:
MGCF receives an INVITE request, containing an initial SDP, through one of the origination procedures and via one of the inter-serving procedures;
MGCF initiates a H.248 interaction to pick an outgoing channel and determine media capabilities of the MGW;
MGCF determines the subset of the media flows proposed by the originating endpoint that it supports, and responds with an Offer Response message back to the originator. This response is sent via the S-S procedure;
The originating endpoint sends a Response Confirmation. The Response Confirmation may also contain SDP. This may be the same SDP as in the Offer Response sent in Step 3 or a subset. The originating UE is free to continue to offer new media on this operation or on subsequent exchanges using the Update method;
MGCF initiates a H.248 interaction to modify the connection established in step #2 and instruct MGW to reserve the resources necessary for the media streams;
MGCF responds to the offered media towards the originating party;
GW reserved the resources necessary for the media streams;
When the originating endpoint has completed its resource reservation, it sends the successful Resource Reservation message to MGCF, via the S-S procedures;
MGCF sends an IAM message to the PSTN;
MGCF sends response to the successful resource reservation towards originating end.
The PSTN establishes the path to the destination. It may optionally alert the destination user before completing the session. If so, it responds with an ACM message;
If the PSTN is alerting the destination user, MGCF indicates this to the originating party by a provisional response indicating Ringing. This message is sent via the S-S procedures;
When the destination party answers, the PSTN sends an ANM message to MGCF;
MGCF initiates a H.248 interaction to make the connection in the MGW bi-directional;
MGCF sends a SIP 200-OK final response along the signalling path back to the session originator;
The Originating party acknowledges the final response with a SIP ACK message.