This document summarizes the evolution of telecommunications networks from 1G to 5G and the transition to an IP-based network using the IMS framework. It discusses the key technologies and standards used in each generation such as GSM, GPRS, EDGE, LTE. It also covers the evolution of the access, transport and session layers from circuit-switched to packet-switched networks. Finally, it proposes a three-phase approach to migrating an existing softswitch-based VoIP network to an IMS architecture by decomposing functions and introducing new IMS elements.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
WebRTC Core APIs and Interfaces , WebAudio API and context analyser, new audio API implementation Panner and MIDI . Plivo WebRTC SDK working with plivo's Voice Core Network .
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
WebRTC Core APIs and Interfaces , WebAudio API and context analyser, new audio API implementation Panner and MIDI . Plivo WebRTC SDK working with plivo's Voice Core Network .
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
SIP (Session Initiation Protocol) is a signaling protocol used to create, manage and terminate sessions in an IP based network. This course is for beginners and aims to give a brief introduction to SIP before one ventures into the long RFC documents.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
This talk discusses RINA a bit more in-depth, taking the audience through several use cases and discussing results showcasing RINA benefits published in a number of conferences and journals. The talk includes a demo of application discovery and distributed mobility management in RINA networks.
Many carriers and ISPs deliver the redundancy by using the "dynamic protocol" such as BGP, OSPF.
On this presentation, BBIX team introduces how to arrange the redundancy on the layer2 network as the IX provider.
SIP (Session Initiation Protocol) is a signaling protocol used to create, manage and terminate sessions in an IP based network. This course is for beginners and aims to give a brief introduction to SIP before one ventures into the long RFC documents.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
This talk discusses RINA a bit more in-depth, taking the audience through several use cases and discussing results showcasing RINA benefits published in a number of conferences and journals. The talk includes a demo of application discovery and distributed mobility management in RINA networks.
Many carriers and ISPs deliver the redundancy by using the "dynamic protocol" such as BGP, OSPF.
On this presentation, BBIX team introduces how to arrange the redundancy on the layer2 network as the IX provider.
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
Techies (An ISO 9001:2008 Certified Company) is promoted by team of highly talented professionals who have combined I.T. and Corporate Experience. Techie's Institute is the Best Institute in Amritsar for Six Months Industrial Training & Six Weeks Industrial Training in Amritsar
Website: www.iamtechie.com
Email: enquiry@iamtechie.com
Satellite IP Trunking networks provide local networks with access to the internet (or any other type of network) from a remote access point to the backbone. Providing IP Trunking and Backbone services to ISPs and Telecom operators requires constant scrutinizing of the operational expenses due to a highly competitive market with razor- thin margins.
This presentation is divided into two parts. The first part describes the mobility management on different layers of TCP/IP stack. In the second, a set of IoT standards is presented including a small description for each.
Practical byzantine fault tolerance by altanaiALTANAI BISHT
Byzantine Fault Tolerance
state machine replication algorithm that is safe in asynchronous systems such as the Internet.Used to build highly available systems
incorporates mechanisms to defend against Byzantine-faulty clients
BFT provides safety and liveness if fewer than 1/3 of the replicas fail during the lifetime of the
system
Recovers replicas proactively : provided fewer than 1/3 of the replicas become faulty within a
small window of vulnerability
3f+1 replicas to survive the failures
3 phases protocol (pre-prepare, prepare, and commit)
Uses cryptographic hash function to compute message digests
And message authentication codes (MACs) to authenticate all messages
Allow for a very strong adversary
A video annotation service, to upload and/or record videos and make time synced playback of annotations. The video content is automatically tagged, clasified and described using congitive service.
Machine Learning applications in Voice over IPALTANAI BISHT
presented in "Women in data science Mysuru "- 2020
Media streams
Echo Cancellation
Noise Suppression
Jitter Control
Image Stabilization
Voice Activity detection
Audio fingerprinting
Echo Cancellation
Telecom Service-based Applications of ANN
Subscriber Churn and Outliers
Complains
Recharges plans
Collect CDR for daily call patterns
- identify high call volumes, or extremely long calls, or high call volumes from a particular extension
Predictive Analysis
Mean Opinion Score (MOS) - key metric for Quality of Service (QoS) of Call
predicting conversational voice quality non intrusively
Language Impact on Voice Quality assessment\
Performance
Metrics of Packet Loss on Different Codecs
VoIP provider based Applications of ANN
Anomaly detection
- Intrusion detection based on Recurrent Neural Network
(RNN) model
- Malicious System Call Sequence Detection (MSCSD)
Call Prioritization
Geographical routing
Call pattern mapping
- Bypass additional checks to remove latency
Etiquette analysis
Regulatory analysis
Telecom Fraud
Traffic Pumping
- “access stimulation” techniques to boost traffic to a high cost destination
Defraud Telecom Service Providers
- Exploitation of SIP trunks ,
- regulatory loopholes
- Premium rate numbers misused
One ring and Cut to generate Call back revenue
Blind Call Transfers
Call Cards
Vishing
VOMIT
SPIT
Detection of Fraud and Countermeasures
Call signatures
Risk Assessment
Fraud occur in off-hours
- when networks are often monitored less closely so that they can go unnoticed longer
Backpropagation Neural Network to detect SPAM calls
VoIP Intrusion Detection ( MiM)
Aggregate data from honeypot application and traffic monitoring to ANN
Recognizing attacks using ANN
Classifying Possible Intrusions
options tests; options scanning; call testing; unknown protocol; register and call; registration test, registration flooding; register attempt
Aggregate data from honeypot application and traffic monitoring to design response
ML_in_voip_altanai_wids_mysuru_sep2020
Current trends and innovations in voice over IPALTANAI BISHT
Learn how to implement an open-source webrtc Click to dial or VOIP setup for their enterprises and also the new innovative add-on tech available for a basic VOIP system such as auto-attendants.
VoIP vs Telecom Providers
SIP Servers types
Open-source tool and technologies in VOIP
Opensip
Kamailio
Freeswitch
Media Handling
Webrtc
Machine learning in VoIP
Call Classifier
Fraud Detector
NLP and Auto attendants
VoIP to telecom bridging
Ramudroid, inspired by Bharat Swachata Abhiyaan, was invented ( v1 in 2015) to clean roads and gullies(lanes) for a cleaner environment.
Talk and demo includes the design and operation, being powered by solar energy, using camera's media stream to identify target garbage type and 3 brush design to lift up small objects like plastic cups, wrappers, leaves etc. Also discusses detecting obstruction to reroute itself and act autonomously. Last we also discuss how we can analyse data on garbage spotted and collected for segregation and spotting defaulter people or neighbourhoods who litter regularly.
In the proposed RFID based recording and identification system, the students and staffs can take books using their mobile phone and a RFID tag. The admin can add or update the new book entries through the web-site.
1. Impact of IOT and connected devices
2. Timeline for Inter of things
3. Enablers like Ipv6, sensors , Moores Law ,
4. Streaming Multimedia
5. WebRTC
6. Building Home surveillance
7. Ramudroid
8. Bottlenecks for media Streaming
Ramudroid v7.0 as presented on IEDF IOT project Day . Additions to existing functionality of bot to clean roads and outdoors are 16x2 LDC , image processing , battery and hardware enhancements , WEBRTC live streaming session details .
Building WebRTC based interesting features and services . WebRTC to stream from remote machine in IOT.
Details of Ramudroid a bot meant for cleaning outdoors uses webrtc stream for remote navigation .
Augmented Reality and WebRTC .
WebGL in browsers
threejs for 3D graphics
code and steps of making cube , sphere , torusknot
wecam texture to 3D plane
motion detection using differential analysis
more samples of AR applications
Service Broker for VOIP IMA WebRTC and old telecom networksALTANAI BISHT
SB( Service Broker ) enables us to make use of existing applications and services from Intelligent Network’s SCP ( Service control Point ) , IMS’s Application Server as well as other sources in a harmonized manner .
Service broker is a service abstraction layer between the network and application layer in telecom environment.
This document describes the process of integrating a Service Broker with service harmonization and orchestration in a telco environment .
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ip transformation by altanai
1. Telecom Study of IP
Transformation
By
Altanai Bisht
tara181989@gmail.com
2. 1 G 2 G 2.5 G 3 G LTE
• SMS (short
messaging
service),
•GPRS, EDGE,
High Speed
Circuit
switched data
was introduced
• Bandwidth of
384 kbps
•High-speed data
transmissions
•Symmetrical and
asymmetrical data
transmission support
•Improved voice quality
•Greater capacity
•Support of global
mobility
•Lack of coverage in
some areas
•Demand for broadband
services in a hand-held
device
•Deployment of LTE
on existing sites
and sharing of
common
infrastructure
•Sharing of
backhauling
equipment
between LTE/SAE
and existing
network
technologies
provided at the
same site
•Common network
management
platforms
•Digital
modulation
• Bandwidth
of 14.4
kbps
•Data Transfer
(only voice)
•No encryption
•Sound quality
is poor
•Speed of
transfer is only
at 9.6kbps
4 G/ 5G
Evolution of Voice in Access Layer
•Higher bandwidth
•Support for global
mobility and service
portability
ubiquitously with
lower cost
•Broadband IP-based
entirely applying
packet switching
method of
transmission with
seamlessly access
convergence
3. ATM
Evolution of Voice in Transport Layer
Frame
Relay
SDH/SONET NG- SDH Metro
Ethernet
ROADM
• Hardware costlier
than the Ethernet
hardware
• Costly for the
data-based
applications
(wastage of
bandwidth)
• Subscribers pay
more for less
required bandwidth
•Cost-effective
•A single box
can handle the
voice, data and
bandwidth
services
•More granular
bandwidths are
available and
subscriber can
enjoy the
flexibility
•Low cost
•Reduces OPEX
and CAPEX by
flexible and
efficient service
provisioning,
service
activation and
OAM functions
•Cost-efficient as
it reduces OPEX
and
CAPEX
significantly for
the largenetworks
•Variable
packet size
•Less
expensive and
upgrading is
easier
•Fixed packet
size
•Convenient for
hardware
implementation
•Cost Higher
4. 4
Evolution of Voice- in Session Layer
IN IMS
•Introduce new services rapidly - IN provides the capability
to provision new services or modify existing services
throughout the network with physical intervention
•Provide service customization - Service providers require
the ability to change the service logic rapidly and efficiently
•Create Open interface - Allows service providers to
introduce network elements quickly for individualized
customer services
•Complex and costly to build and maintain as the number of
services grows
•Services are specified and supported by a single logical
node, or set of nodes, performing specialized tasks for each
specific service. Each service is an island, with its own
service-specific node
•To create and secure interconnect agreements on every
single service an extensive and tedious task
•Access agnostic infrastructure — services
are independent of the underlying access network
• Full mobility — transparent connectivity across
heterogeneous networks, protocols, and access mechanisms
• Always on, always available capabilities, through sessions
that cross networks and devices automatically and
transparently
• User-centric context, both device and context-
Sensitive
•QoS (Quality of Service) : The IMS takes care of
synchronizing session establishment with QoS provision so
that users have a predictable experience
•Integration of different services : Operators can use services
developed by third parties, combine them, integrate them with
services they already have, and provide the user with a
completely new service
5. •Enables convergence, and interworks in
several dimensions – across fixed and mobile
access – in the service layer, control layer and
connectivity layer
•Fast and efficient service creation and delivery
by designing systems to support multiple
Application Servers. Same infrastructure can be
utilized for new services, with the
implementation effort focusing on the actual
service and not on basic features
•IMS has Communication Services which
standardizes a few basic communication
patterns that can then be provided as
application building blocks.
IMS
7. What is CMTS
CMTS is a router with Ethernet interfaces (connections) on one side and coax RF
interfaces on the other side. The RF/coax interfaces carry RF signals to and from the
subscriber's cable modem.
Architecture of a typical VoIP/SIP scenario
9. DOCSIS
Data Over Cable Service Interface Specification (DOCSIS ) is an international
telecommunications standard that permits the addition of high-speed data transfer to an
existing cable TV(CATV) system. It is employed by many cable television operators to
provide Internet access over their existing hybrid fiber-coaxial(HFC) infrastructure.
Architecture of a typical VoIP/SIP scenario
Features:
Channel width:
Down Steam- 6 MHz channels or 8 MHz channels
upstream-between 200 kHz and 3.2 MHz DOCSIS 2.0 also specifies 6.4 MHz
Modulation:
Down Stream- 64-level or 256-level QAM
Upstream- QPSK or 16-level QAM (16-QAM) for DOCSIS 1.x, and it uses QPSK, 8-QAM, 16-QAM, 32-QAM, 64-QAM
for DOCSIS 2.0 & 3.0. DOCSIS 2.0
Throughput:
Down Stream- 42.88 Mbits/s per 6 MHz channel, or 55.62 Mbit/s per 8 MHz channel
Upstream- of 30.72 Mbit/s per 6.4 MHz channel, or 10.24 Mbit/s per 3.2 MHz channel
10. PacketCable
PacketCable architecture contains three networks: the "DOCSIS HFC Access Network",
the "Managed IP Network" and the PSTN. The Cable Modem Termination System (CMTS)
provides connectivity between the "DOCSIS HFC Access Network" and the "Managed IP
Network". Both the Signaling Gateway (SG) and the Media Gateway (MG) provide
connectivity between the "Managed IP Network" and the PSTN.
Architecture of a typical VoIP/SIP scenario
12. PacketCable Implementation- Contd..
The diagram shows high level diagram of a PacketCable DQoS network architecture that shows the three segment
model. In this diagram, the network elements impacted by DQoS are the Multimedia Terminal Adapter (MTA), the
Cable Modem Termination System (CMTS), the Call Management Server (CMS), and the Record Keeping Server
(RKS).
The Cisco BTS 10200 Softswitch performs the functions of the CMS in a DQoS capable network.
Cable Modem Termination System (CMTS)-The CMTS is responsible for allocating and scheduling upstream and
downstream bandwidth in accordance with MTA requests and QoS authorizations established by the network
administrator. The CMTS implements a “DQoS Gate” between the DOCSIS cable network and an IP backbone.
Cable Modem (CM)-The CM is the PacketCable network element responsible for classifying, policing, and marking
packets once the traffic flows are established by the DQoS signaling protocols.
Call Management Server (CMS)-The Call Management Server entity performs services that permit MTAs to
establish Multimedia sessions .
Media Gateway Controller (MGC)-The Cisco BTS 10200 Softswitch performs the function of a media gateway
controller (MGC),providing signaling to trunking gateways (TGWs). This allows calls to be connected between the
PacketCable network and the PSTN
14. Typical VOIP/SIP scenario without IMS
Architecture of a typical VoIP/SIP scenario
A basic enterprise VoIP/SIP solution
is illustrated in Figure. The key element
is a soft switch (SIP PBX) which might
be implemented as a combination of
several SIP entities, such as SIP
registrar, proxy server, redirect server,
forking server, Back-To-Back User
Agent (B2BUA) etc.
SIP clients can be SIP hard-phones
or soft-phones on PCs, PDAs etc. A
PSTN gateway links the enterprise SIP
PBX to the public PSTN.
Enterprise applications, media
servers, presence servers, and the
VoIP/SIP PBX are interconnected
through a company intranet.
15. Migration towards IMS
With IMS, applications will be able to establish sessions across different access
networks, with guaranteed QoS, flexible charging & AAA support.
16. In this solution, the enterprise domain always forks incoming calls to operator.com.
The enterprises SIP PBX works as a forking proxy during call setup.
INVITE
Migration towards IMS- forking calls
INVITE
Forking Solution
17. Migration towards IMS- Roaming
When a user turns on a mobile terminal, it will register with the operator domain for
access. World-wide access is supported thanks to operator-operator roaming agreements.
Once able to send IP-packets, the client will contact the enterprise.com domain to register
under its new location and thereby inform SIP PBX about the location change.
INVITE
INVITE
Client Based Solution
18. Migration towards IMS- Presence
In this solution, both domains interconnect their presence servers. These two domains
have a business agreement so that they can watch the presence status off each other’s
domain for certain clients.
Presence Based Solution
19. Migration towards IMS- Possible Migration Scenarios
This solution requires an initial setup as the operator needs to store information that a
certain user belongs to a certain enterprise domain uses a certain pre-defined enterprise
based SIP URI.
In enterprise domain there is an application server that handles the link registration using
subscribe-notify mechanism to do link-register service subscription.
Link Registration
21. Comparison Between Soft Switch and IMS
•IMS further decomposes softswitch functions and adds a few new concepts. Call control, user’s database and services,
which are the typical functions of softswitch, are controlled by separate units in IMS. CSCF (Call Session Control
Function) handles session establishment, modification and release of IP multimedia sessions using the SIP/SDP protocol
suite.
•Services features are separated from call control and handled by application servers.
•Subscriber’s database function is separated from service logic function and handled by HSS using open subscriber
directory interface.
Services Services
Users
Users
Services
Call Control
Function
Call/Session Control
Function
Access and Transport Access and Transport
Soft Switch IMS
22. Migration towards IMS- Phase 1
As the first step, the softswitch is decomposed into two logical components – subscriber facing unit and PSTN facing unit.
The subscriber facing unit in softswitch is upgraded to AGCF (Access Gateway Control Function) and PSTN facing unit
is upgraded to MGCF (Media Gateway Controller Function) to interwork with IMS as shown in Figure 3.
By separating the softswitch into these components, the network can be more easily scaled for better overall network
efficiencies. More AGCFs can be added as required, allowing the network to scale with increase in subscribers.
Similarly, More PSTN trunks can be added as traffic increases. Once PSTN and subscriber control functions are
separated, the IMS elements, CSCF and BGCF functions can be introduced. BGCF is the interface for interconnecting
IMS with legacy PSTN networks.
Decomposing Softswitch to AGCF and MGCF
23. Migration towards IMS- Phase 2
To retain existing customers and attract new customers, new SIP-based services can now be rapidly introduced and
delivered by deploying new Application Servers (AS).
IMS introduces the 3GPP specified ISC interface, which is a SIP-based interface for interfacing to application servers.
Using these constructs, multiple application servers from multiple vendors can be interconnected over the IMS ISC
interface.
Application servers can be used remotely for faster rollout of services.
Inserting Application Server for SIP application service and Solutions
24. Migration towards IMS- Phase 3
Moving toward fixed/mobile convergence(FMC), a service provider can address several business needs relating to the
introduction of “triple play on the move.”
The dual-mode devices can communicate over the cellular network, or act as a new endpoint on the IP network.
The Home Subscriber Server (HSS), the last missing piece of the IMS architecture, is introduced. It is needed to manage
subscriber data uniformly between the cellular and IP worlds.
The Handoff Server is also introduced in this phase. It runs on top of the ISC interface, and provides a seamless
experience when subscribers move from the cellular network to a Wi-Fi network.
The AGCF remains the functional centre of the
network, but with the introduction of the HSS, has
added the Cx and Sh interfaces defined by the
IMS, taking it a step further to becoming a
complete SCSCF.
Inserting HSS and Handoff Server for Fixed/Mobile Convergence