Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from and replaces the much less capable RADIUS protocol that preceded it. in this presentation I will try to familiarize you with the new AAA protocol and deep dive into the diameter protocol details, Credit Control Application (Gx,Gy and GZ) and sample use case for peering Sandvine PTS (Working as PCEF) with freePCRF.server and finally introduce you with seagull, a popular test tool to test different diameter-based scenarios. Hope you like it
basim.alyy@gmail.com
basimaly.wordpress.com
https://eg.linkedin.com/pub/basim-aly/38/774/228
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
LTE network: How it all comes together architecture technical posterDavid Swift
Mobile network operators that want to deploy LTE now want to do so on their own terms. They want to roll out ultrafast mobile broadband safe in the knowledge that one vendor’s solution will work efficiently with another, while delivering the high level of service that subscribers expect. A standards-based network will ensure the goal is met and help drive down cost for operators, but understanding how to pull it all together can be a challenge. So how does it all come together?
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
LTE network: How it all comes together architecture technical posterDavid Swift
Mobile network operators that want to deploy LTE now want to do so on their own terms. They want to roll out ultrafast mobile broadband safe in the knowledge that one vendor’s solution will work efficiently with another, while delivering the high level of service that subscribers expect. A standards-based network will ensure the goal is met and help drive down cost for operators, but understanding how to pull it all together can be a challenge. So how does it all come together?
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
If you're new to openstack and you want get some hands on it then you have to install the Devstack. a bundled version for all openstack services and components in one software.
Whether you are replacing Telnet or Terminal, or need a more capable secure remote access tool, SecureCRT is an application you can live in all day long. With the solid security of SSH, extensive session management, and advanced scripting, SecureCRT will help raise your productivity to the nth degree.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Diameter based Interfaces and descriptionManjeet Kaur
Diameter is an authentication, authorization, and accounting protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs to the application layer protocols in the internet protocol suite.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
If you're new to openstack and you want get some hands on it then you have to install the Devstack. a bundled version for all openstack services and components in one software.
Whether you are replacing Telnet or Terminal, or need a more capable secure remote access tool, SecureCRT is an application you can live in all day long. With the solid security of SSH, extensive session management, and advanced scripting, SecureCRT will help raise your productivity to the nth degree.
An introductory slides for explaining the SDN and NFV technologies. what's the difference between them and when each one is used. Also it talk about some of Cisco products in each area either SDN or NFV or the Automation with some of real use cases deployed in today's service provider network.
Hope you like it
The guide to build a python development VM on your local windows machine to combine both the efficiency of linux and the usability of windows laptop - I use pycharm as an example of python IDE but you can use any IDE that support the remote deployment. For more info about remote deployment function please see the below link
https://basimaly.wordpress.com/2015/12/05/remote-deployment-using-pycharm/
What is PCRF? – Detailed PCRF architecture and functioningMahindra Comviva
PCRF- Policy and Charging Rules Function- is a dedicated policy controller equipment standardized in 3GPP, enabling policy function for charging & bandwidth on the multimedia networks. Smart Policy Control function combines network and customer intelligence to launch tailored service offerings for business and residential customers.
Read more: http://www.mahindracomviva.com/products/internet-broadband-solutions/smart-policy-control-suite.htm
LAS16-306: Exploring the Open Trusted ProtocolLinaro
LAS16-306: Exploring the Open Trusted Protocol
Speakers: Marc Canel
Date: September 28, 2016
★ Session Description ★
Interconnected systems require trust between devices and service providers. To deal with this problem, several companies (ARM, Solacia, Symantec, Intercede) collaborated on the Open Trust Protocol (OTrP), which combines a secure architecture with trusted code management, using technologies proven in large scale banking and sensitive data applications on mass-market devices such as smartphones and tablets.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-306
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-306/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
RADIUS is a protocol for carrying information related to authentication, authorization, and configuration
between a Network Access Server that desires to authenticate its links and a shared Authentication
Server.
RADIUS stands for Remote Authentication Dial In User Service.
RADIUS is an AAA protocol for applications such as Network Access or IP Mobility
It works in both situations, Local and Mobile.
It uses Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol
(CHAP), or Extensible Authentication Protocol (EAP) protocols to authenticate users.
It look in text file, LDAP Servers, Database for authentication.
Rebaca has been providing development and deployment support related to PCRF, AAA Server, SPR, DPI, Policy Server, EMS/NMS (SNMP, TR069), Subscriber Management, Service Provisioning, Assurance and Monitoring and Providing customization services (Mediation, Portal Development). for Tier-1 Operator like Reliance, Maxis, Bakrie,Zain, Optus, Tigo etc.
The key expertise areas are:
Familiarity from Wireless network (GSM/CDMA/LTE) to Wireline Network : DSL, xDSL
Familiarity with AAA Server ,PCRF, SPR, DPI
Familiarity with PCRF Diameter Interfaces : Gx, Gy, Gx+, Sh, Rx, Gz, Ro, S9, Gxx
Interoperability testing with GGSN,PDSN, OCS , DPI Switches , Edge Routers
Policy Server deployment , Customer data Migration and Service activation
Customer Care and Self Care Portal development
SNMP and TR-69 based EMS.
How to connect FIWARE to Robots ? We discuss how the FIWARE enablers can connect to ROS2, a de facto standard for robotic frameworks, using Fast RTPS and KIARA.
Speaker: Atul Kshirsagar, GE Software
To learn more about Pivotal Cloud Foundry, visit http://www.pivotal.io/platform-as-a-service/pivotal-cloud-foundry.
An experience is a personal and emotional event we remember. Every experience is established based upon pre-determined expectations we conceive and create in our minds. It’s personal, and therefore, remains a moving and evolving target in every scenario. When our experience concludes and the moment has passed, the outcome remains in our memory. Think about what makes you happy when connecting with your own device and then think about what makes you really upset when things are hard, complicated, and slow. If the user has a bad experience in anyone of these areas (simple, fast, and smart), they are likely to leave, share their negative experience, and potentially never return. Users might forget facts or details about their computing environment but they find it difficult to forgot the feeling behind a bad network experience. When something goes wrong with the network or an application, do you always get the blame?
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Large venues like stadiums or concert halls are challenging environments for Wi-Fi deployments. Most of today’s phones and tablets carry Wi-Fi interfaces. A safe assumption is that at least one device per person in a stadium carry a Wi-Fi interface. Monetizing those Wi-Fi interfaces with real time information of the event in the venue, targeted advertising, internet access, multimedia and social applications can create new revenues to the owner of the venue, if executed properly.
Anuta ATOM delivers a modular, extensible, scalable
and cloud-native software platform that enables enterprises and service providers to rapidly design and provision network services, collect real-time telemetry, develop in-depth network
analytics, ensure compliance and provide service assurance for multi-vendor physical and virtual infrastructure. With ATOM, networking teams can deliver services faster, eliminate
human errors, avoid security violations, reduce OpEx and meet SLAs with exceptional high availability.
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Aruba-AppRF-AOS-6-x-amp-8-x/td-p/490800
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. What’s Diameter
• Diameter is an authentication, authorization, and accounting protocol
• Work within AAA Framework
• Provides an upgrade path for RADIUS
• Dynamic discovery of peers (using DNS SRV and NAPTR)
• Capability negotiation
• Error notification
• RFC 6733
3. Reliable Transport Depend on TCP to transport the message
More Secure Depend on IPSEC and STCP protocols
WIDER Twice as radius in AVP!
App based-
Extensible
You can extend the core code by building your own application
over the top
Why use DIAMETER over the RADIUS?
4. One More reason
Once subscriber reached to purchased quota, The diameter client will trigger an
event to inform the server, However in radius-based network you have to wait for
the incoming Accounting-Interim to trigger this action which is considered a
revenue leakage
7. Diameter Elements
MME (Mobility Management Entity)
HSS (Home Subscriber Server)
EIR (Equipment Identity Register)
CSCF (Call Session Control Function)
PCRF (Policy and Charging Rules Function)
PCEF (Policy and Charging Enforcement Function)
SGSN (Serving GPRS Support Node)
PDN GW (Packet Data Network Gateway)
8. CCA
We will discuss this scenario later!
Through passing CGI (Cell Global Identifier) and RAI (Routing Area
Identifier) from PCEF (GGSN) to PCRF in Event-Trigger AVP
Support Roaming(Inter-PLMN)!
9. Diameter Core Protocol
Application1 (Gx) Application2 (SIP)
• Diameter allow you to write a new application as an extension to base
code. these apps not a software app but a new protocols that use diameter
original code
• The Diameter protocol will replace the SS7 and SIGTRAN by
introducing a new Interfaces (Apps!) that will connect to HSS
Diameter Applications
10. Diameter RADIUS
Transportation Protocol
Connection-Oriented
Protocols (TCP and SCTP)
Connectionless Protocol (UDP)
Security Hop-to-Hop, End-to-End Hop-to-Hop
Agent Support
Relay, Proxy, Redirect,
Translation
Implicit support, which means the
agent behaviors might be
implemented in a RADIUS server
Capabilities Negotiation
Negotiate supported
applications and security
level
Don't support
Peer Discovery
Static configuration and
dynamic lookup
Static configuration
Server Initiated Message
Supported. for example, re-
authentication message,
Session termination
Don't support
Maximum Attribute Data Size 16,777,215 octets 255 octets
Vendor-specific Support
Support both vendor-
specific messages and
attributes
Comparison Between Radius and Diameter
15. • An access network that provides Internet Protocol (IP) connectivity.
• The term is usually used in cellular context
1 of 3
IP-CAN(IP Connectivity Access Network)
New Definitions
16. The IP-CAN domain ends with the GGSN or (P-GW) node and it
created after the PCRF install the rules in PCEF
2 of 3
New Definitions
IP-CAN
17. • 3GPP-GPRS (0) This value shall be used to indicate that the IP-CAN is
associated with a 3GPP GPRS access that is connected to the GGSN
based on the Gn/Gp interfaces and is further detailed by the RAT-Type
AVP. RAT-Type AVP will include applicable 3GPP values, except
EUTRAN.
• DOCSIS (1) This value shall be used to indicate that the IP-CAN is
associated with a DOCSIS access.
• xDSL (2) This value shall be used to indicate that the IP-CAN is
associated with an xDSL access.
• WiMAX (3) This value shall be used to indicate that the IP-CAN is
associated with a WiMAX access (IEEE 802.16).
3 of 3
IP-CAN Types
New Definitions
18. • 3GPP2 (4) This value shall be used to indicate that the IP-CAN is
associated with a 3GPP2 access connected to the 3GPP2 packet core
as specified in 3GPP2 X.S0011 [20] and is further detailed by the RAT-
Type AVP. AVP.
• 3GPP-EPS (5) This value shall be used to indicate that the IP-CAN
associated with a 3GPP EPS access and is further detailed by the RAT-
Type AVP.
• Non-3GPP-EPS (6) This value shall be used to indicate that the IP-CAN
associated with an EPC based non-3GPP access and is further detailed
by the RAT-Type
3 of 3
IP-CAN Types
New Definitions
19. Capacity 1 Delay 1 Bit-Error Rate 1
Capacity 2 Delay 2 Bit-Error Rate 2
Bearer 1
Bearer 2UE
The Bearer is created inside IP-CAN according the service requirement. If you
have VoLTE service that need high bandwidth with low latency, and browsing
service that work on best effort then you need two Bearers for the same IP-
CAN with different QoS
New Definitions
1 of 2
Bearer
20. Default bearer
Dedicated bearer
for VoIP for example
APN-Aggregate-Max-Bitrate-UL=1M
APN-Aggregate-Max-Bitrate-DL=2M
Max-Requested-Bandwidth-UL=10M
Max-Requested-Bandwidth-DL=10M
Bearer-Identifier=999
Default-EPS-Bearer-QoS AVP
QoS-Information AVP
2 of 2
New Definitions
Bearer AVP
21. This is Policy and Charging Control. It could be either Dynamic (Rules are
pushed from PCRF to PCEF) or Static (PCRF just Activate or Deactivate the
pre-defined rules in PCEF)
Dynamic Static
1 of 1
New Definitions
PCC
24. • Each command is either a request or answer is assigned a command
code
• The request or answer is identified via the ’R’ bit in the Command Flags
field of the header.
Command Code
27. Capabilities-Exchange
CER CEA
1
• A negotiation message between diameter peers to agree on supported
applications
• Command Code Number : 257
• Diameter peers use it to create peer table
• Message Exchange advertise the following:
• Peer Identity
• Use the secure transport or not
• SCTP Host address
Command Code
28. Device-Watchdog-Request
DWR DWA
• A keep alive message between the diameter peers to watch the status
and availability
• Command Code Number : 280
Keep Alive, We need You JIM!
2
Command Code
33. Session-Id1
AVP: Session-Id(263) l=47 f=-M- val=qps.tedata.net;4FD78691;5458;3B9ACA00;0
AVPairs
• The Session Identifier for the Subscriber
• Never Changed as long as the Subscriber session is up
• Consist of the diameter peer name followed by unique number
34. • Each vendor create application should have a unique vendor ID
Vendor-Id2
AVPairs
35. • Identify the broadcasted Diameter Origin Peer Name
• Example : Origin-Host : pcef1.tedata.net.eg
Origin-Host3
AVPairs
39. Host-IP-Address7
• The Source IP address that initiate the Diameter message
• Sent in HEX format
• Example : Host-IP-Address: 1.1.1.7
• Use the below website to obtain the hex value from IP Address
http://ncalculators.com/digital-computation/ip-address-hex-
decimal-binary.htm
Padding 0x0001
0x00010A8347AC
AVPairs
40. Event-Trigger8
Sent from PCEF to PCRF to inform it of specific Event occur
Example Values:
• Event-Trigger: LOSS_OF_BEARER
• Event-Trigger: SGSN_CHANGE
• Event-Trigger: RAI_CHANGE
AVPairs
41. Uniquely identify the supported application ID (Gx, Gy, Vodafone Gx, E///..etc)
3GPP Gx Application ID =16777238, Old was 16777224.
Check this link http://www.iana.org/assignments/aaa-parameters/aaa-parameters.xhtml
Application ID
42. Credit Control Application1
• Used to identify the credit control application
• Associated with CC-Request-Type
• INITIAL_REQUEST (CCR-I) or (CCA-I)
• UPDATE_REQUEST (CCR-U) or (CCA-U)
• TERMINATION_REQUEST (CCR-T) or (CCA-T)
Application ID
43. Auth-Application-Id
The Auth-Application-Id AVP (AVP Code 258) is used in order to advertise
support of the Authentication and Authorization portion of an application. The
Auth-Application-Id MUST also be present in all Authentication and/or
Authorization messages that are defined in a separate Diameter specification
and have an Application ID assigned.
Acct-Application-Id
The Acct-Application-Id AVP (AVP Code 259) is used in order to advertise
support of the Accounting portion of an application The Acct-Application-Id
MUST also be present in all Accounting messages. Exactly one of the Auth-
Application-Id and Acct-Application-Id AVPs MAY be present.
AVPairs
44. Developed Application
Authentication Portion
of application
Authorization Portion
of application
Accounting Portion of
application
Diameter Core
Auth-Application-Id AVP Acct-Application-Id AVP
109
Application-Id
Vendor-Id
AVPairs Summary
47. Build over Diameter Core Protocol
Provide a framework for real-time charging
The application specifies methods for:
Quota management (Reserve, Reauthorize, Abandon)
Simple Debit/Credit
Balance checks
Price inquiries
Does not specify which type units are bought/used
CCR/CCA
Credit Control
49. The purpose of the diameter credit control application is to
provide a framework for real-time charging, primarily meant for
the communication between gateways/control-points and the
back-end account/balance systems (typically an Online
Charging System)
Command Code = 272 Auth-Application-Id=4
Credit Control
50. Credit-Control-Request (CCR) Command
The Credit-Control-Request message (CCR) is indicated by the command-code
field being set to 272 and the 'R' bit being set in the Command Flags field. It is
used between the Diameter credit-control client and the credit-control server to
request credit authorization for a given service. The Auth-Application-Id MUST
be set to the value 4, indicating the Diameter credit-control application.
Credit Control Request(CCR)
51. CCA Command sent from PCRF to PCEF as a
response to CCR
Provide PCEF with the following info
PCC rules
Event Trigger (When to report an event back to PCRF)
Selected bearer control mode for the IP-CAN session
Credit Control Answer(CCA)
53. PCEF/DPI
CC-Request-
Type=Initial
Credit Control
Answer
ReAuthorization
Request
ReAuthorization
Answer
Note the request is sent
using the Subscriber Name
and IP address received
from Radius accounting
ThisiscalledIP-
CANsession
1-Subscriber is connected to BNG which will send accounting start to AAA.
2-AAA will proxy accounting to DPI contains the username and IP Address
3-user start to browse internet and send traffic through the DPI
4-DPI will stop the traffic and will send CCR-I with IP address to PCRF. Smth like
query to get the username
5-PCRF will consult the SPR and will return the policies in CCA
Attach to
Network
1
54. 1-PGW send CCR-I with Subscriber-Id (IMSI or MSISDN or etc...) and Framed-
IP (IP address what network give for this device) to PCRF
2-PCRF calculate user tariff and respond policy or bearer settings
Calculate
Tariff in real
time
2
55. Interface between PCEF (BNG/DPI/GGSN) and
PCRF
PCRF send PCC rules to be installed on PCEF
Upon receive of an Event-Trigger, PCRF can puch a
new PCC rule over Gx for new bearer creation
Gx Interface
56. Interface between PCEF (BNG/DPI/GGSN) and
OCS
Used for Online Charging (Pre-Paid)
Used to take real-time decision on tired services
Gy Interface
57. Interface between PCEF (BNG/DPI/GGSN) and
OFCS
Used for Offline Charging (Post-Paid)
offline charging is a mechanism where charging
information does not affect, in real-time, the service
rendered.
Gz Interface
59. Username Identifier
• Subscriber username sent in Subscription-Id AVP
• Subscription-Id consist of two AVPs
– Subscription-Id Type
• Type of connected subscriber (Mobile, ADSL..etc)
– Subscription-Id value
63. Credit Control PCEF Sample Configuration(3/3)
• Identify Destination Realm
• Identify the Original Realm
• Identify the IP_CAN_TYPE = ADSL
• Identify the Subscription-id type = NAI
• Identify the Subscription-id value Sandvine
DPI PTS
65. First thing that you should notice inside the diameter protocol packets is the Command
Code AVP and CC-Request-Type AVP that indicates the type of request whether it’s
INITIATE(CCR-I) or UPDATE or TERMINIATE..etc
Request
- Initial
CC
CCR-I
Credit Control PCAP
67. • Seagull is a free, Open Source (GPL) multi-
protocol traffic generator test tool.
• powerful traffic generator
• Used for stress testing
• Developed by HP
• Coded using C++
• Simulation tool developed by HP to simulate
different protocols
• SIP
• Diameter
• Radius
• Support Linux (Centos/Debian) and Windows
(Through cygwin
Seagull
http://gull.sourceforge.net/
70. Define the correct client configuration3
#vim /opt/seagull/diameter/config/conf.client.xml
Define the correct dictionary file to be used for both client and server4
#vim /opt/seagull/diameter/config/base_cc.xml
Define the scenario5
#vim /opt/seagull/diameter/scenario/ccr-cca.client.xml
Seagull
71. Create Run script to use the files you created before6
#cd /opt/seagull/diameter/run
#vim start_client_gx_ccr_cca.ksh
#!/bin/ksh
export LD_LIBRARY_PATH=/usr/local/bin
seagull -conf /opt/seagull/diameter/config/conf.client.xml -dico
/opt/seagull/diameter/config/base_cc.xml -scen
/opt/seagull/diameter/scenario/ccr-cca.client.xml -log
/opt/seagull/diameter/logs/ccr-cca.client.log -llevel ET
Run the test7
cd /opt/seagull/diameter/run
./start_client_gx_ccr_cca.ksh
Seagull
72. Configure Client
(PCEF)
Create Channel (Diam version..)
Whom to open channel with (PCRF IP)
Call ch (Rate/timeout/max number..)
Load external data
Where to log the events
#vim /opt/seagull/diameter/config/conf.client.xml
Seagull
73. Configure Dictionary
Diameter header (CMD, HbH, EtE..)
Diameter base AVP with their values
Define diameter commands structure (CER,
CCR, RAR..)
Here you should define any vendor-spcefic
attributes (next slide)
#vim /opt/seagull/diameter/config/base_cc.xml
Seagull
75. Configure Scenario
Configure init section (configure both Send &
Receive tags that negotiate CER)
Configure traffic section (configure both Send &
Receive tags that send actual traffic)
#vim /opt/seagull/diameter/scenario/ccr-
cca.client.xml
Seagull
76. Run
Connecting the dots
Identify the config location
Identify the dictionary location
Identify the scenario
Identify where to store the log
Identify the debug level
#vim
/opt/seagull/diameter/run/start_client_cc.ksh
#export LD_LIBRARY_PATH=/usr/local/bin
#seagull -conf ../config/conf.client.xml -dico
../config/base_cc.xml -scen ../scenario/ccr-cca.client.xml -log
../logs/ccr-cca.client.log -llevel ET
If you can’t find seagull command, then copy content of seagull
bin folder the package to /usr/bin directory
You may need to install KSH package from YUM/apt-get
Seagull