SlideShare a Scribd company logo
1 of 40
Download to read offline
A N T R A X

Teaching Presentation, Flames Group SIA
Part I

What is Voice
transit?
Origination and Termination Processes
Scheme
Call origination process

Transit
Operators

Voice Traffic Termination
Operator B
Subscriber B

Subscriber A
Operator A

Call termination process

The call termination process is totally different from the call origination process
Main types of operators

National operators

Land-line operators
Licensed Mobile Operators (CDMA, GSM)
Large Transit (VoIP) Operators
GSM Terminators
Small Transit (VoIP) Operators

VoIP: subscribers are connected via soft-phones or calling cards
Types of inter-operator connections (physical level): copper, optics, Ethernet
Transit operators
Key occurrence reasons

Technological

We couldn't
call to
another
continent
using only
a cable

Political

Different
countries,
each of
them have
it's own
policy

Commercial

The
government
prohibit
operators to
connect
directly

Personal
wealth

Management
companies
need to earn
profit
Tarification
Main principles
Long distance tarification

International tarification

Dial code

Description

Price

Valid Date

Tarification

38

Ukraine

0.15 USD

1.1.2000

1/1

38 067
38 097
38 096

Ukraine
Kyivstar

0.10 USD

1.1.2001

1/1

38 050

Ukraine MTS

0.08 USD

1.1.2005

1/1

0/1/1 – per second

0/60/60 – per minute

tarification

tarification

60/60 tarification principle uses only in Mexico
Routing
Example
This is a process of choosing the route for the voice call
The process is based on tariff differences
and quality of the route
Subscriber A
Operator A

Transit Operators

Operator B
Subscriber B
Voice over Internet Protocol
History

VoIP technology occurred in the early 2000. It was a
behavior of the telecommunications industry and the
openness and freedom of the Internet that brought
this technology to the forefront of communications.
And, it will be the economic forces that provide the
motivation for companies to develop and use VoIP
technology.
By 2000, VoIP calls accounted for 3% and by 2003 that number had jumped up to 25%
Income distribution
Among the telecom operators
Cost
0.50 $/min
0.10 $/min

0.25 $/min
0.20 $/min

0.17 $/min

0.15 $/min

Operator
A

Operator
B
Margin
0.05$/min

Subscriber
A

Margin:
0.25$/min

0.00
$/min

Margin
0.03$/min

Margin
0.02$/min

Transit Operators

Margin
0.05$/min

Margin:
0.10$/min

Subscriber
B

Transit operators do not have their own subscriber base
Routes quality
Main Indicators
ACD

ASR

PDD

Answer

Post

Call

Seizure

Dialing

Duration

Ratio

Delay

Good ACD = 3 – 4 minutes

DTMF

FAX

Calling

Average

CLI

Dual-tone

Short for

Line

multi-

facsimile

Identificat

frequency

(T.38

ion

signaling

protocol)

Good PDD is less then 300 ms

Good ASR = 30 – 50%
Quality of the routes
Main definitions

Premium
quality

TDM
quality

Retail
quality

The route
with absolute
quality:
DTMF, CLI,
FAX,
reasonable
PDD

The route
shows high
quality:

It is “pig in a
poke”.

Good ASR,
ACD, PDD.
CLI might
be hidden

All indicators
should be
checked twice;
CLI, FAX, DTMF
optionally

Direct
quality

GSM
quality

Wholesale
quality

Obviously it is
a route from
the direct
supplier

Route
provided
through
GSMgateways

Low-quality
routes. No CLI,
DTMF, FAX
options. FAS
could be
expected

FAS – False Answer Supervision
Traditional Call Scheme

Here we can see call scheme with no FAS
FAS
False Answer Supervision
False Answer/False Ring

Early Answer

Late Disconnect

False answers occur when a carrier deliberately charges a connection period while in reality the call was
not connected to the destination.
Soft Switch

Most popular among CIS operators are: ”Mera” and “Asterisk”
Soft Switch
Billing
Operator A
SIP

Operator B
SIP/H.323

Protocol converter

Billing server
Main functions:

PSTN
GSM
network

Virtual Office
IP-PBX
Operator C
H.323

Billing Server operates the Soft Switch

- Authentication;
- Authorization;
- Accounting;
- Routing;
- Statistics;
- Billing.
Part II

GSM Network
Architecture
GSM Network Architecture
Scheme
Base Station
Base Station Controller

The “intelligent” part of the
base station subsystem.
Performs radio channels
management

Cell – is the smallest radio coverage area in the network
LA – Location Area (a group of cells)
GSM Network Architecture
Scheme

HLR – Home Location Register

AuC – Authentication Center

VLR - Visitor Location Register

EIR – Equipment Identity Register

MSC – Mobile Switching Center
GSM Carrier Frequencies
GSM networks use various bandings, or in other words different Wave streghts/lenghts/frequecies to provide their services

GSM 900, is where the
specific mobile carrier
uses, 900Mhz as the
wave length, or banding
for its services. This
is one of the lowest
of todays commercial
communication services

GSM 1800 networks use
a wide range of signals,
starting from 800 MHz
and then 1700 MHz or
else 1800 MHz at a
maximum

GSM 900/1800 network - it is a
single network with a common
structure, logic, and monitoring
where the phone is not switching

GSM-900 and GSM-1800 are used in most parts of the world: Europe, Middle East, Africa, Australia and
most of Asia. In South Americas it is in Costa Rica (GSM-1800), Brazil (GSM-850, 900 and 1800),
Guatemala (GSM-850, GSM-900 and 1900), El Salvador (GSM-850, GSM-900 and 1900).
GSM Gateway
What is it?

A VoIP GSM Gateway
enables direct
routing between IP,
digital, analog
and GSM networks

Through least cost
routing the gateways
select the most
Cost-effective
telephone connection

With these devices
(fixed cellular terminals)
companies can significantly
reduce the money they
spend on telephony,
especially the money
they spend on
calls from IP to GSM

They check the
number which is
dialed as well as
rate information
which is stored in
an internal routing table

The core idea behind cost saving with VoIP GSM Gateways is Least
Cost Routing (LCR)
Gateway
Where does the Internet occur?
Subscriber
A

Subscriber
B

INTERNET
Operator B
Operator A
Copper
connection

Transit operator 1

Gateway

VoIP
Transit operator

Optical connection

Transit operator 2
TDM connection

IP connection

Transit operator 3

Transit operator 4
Ethernet
connection

Internet is most common to appear while call is transmitting between transit
operators
GSM Gateway
Where is it?

When using a gateway you can save money due to calls organizing between
subscribers without use of fixed-line operators
GSM Gateway
Examples of use
1. How do call centers use the gateway:

Internal
subscribers

PBX with
support of
SIP or H.323

Gateway

GSM
subscriber

2. How do companies use the gateway:

Internal
subscriber

PBX with
support of
SIP or H.323

VoIP gateway addresses a request to PBX that:
●
●
●

Dials GSM number of the subscriber through the gateway;
Calls the requested extension number;
If both sides answered, GW establish a voice connection.

GSM
subscriber

There are several types of network, connected with the gateway:
●
●
●

GSM and IP (VoIP) networks;
PSTN and VoIP networks;
PSTN and GSM networks;
GSM Gateway
Architecture

GSM Gateways are usually using by offices, call centers and gsm terminators.
Usually GSM Gateways are placed to the space with limited human access and in
different cells (ex: Data Centers, lofts, etc.)
GSM Gateway
Net Tariffs
Transit operators
Subscriber
A

0.40$/
min

0.20$/
min

Operator
A

Margin:
0.05$/min

Margin:
0.20$/min

0.05$/
min

Margin:
0.05$/min

0.10$/
min

Gateway

Margin:
0.05$/min

Operator
B
Margin:
0.05$/min

0.15$/
min

(with Sim-cards)
Margin:
0.10$/min

Net tariffs
0.00$/
min
0.00$/
min

Subscriber
B

Subscriber
B

When terminator diverts call to subscriber B and use only operator's B
network, he will have a net tariffs
Part III

GSM Network
Anti-Fraud
Anti-Fraud
What's that?
If gateway acts not like a
human, it becomes a target
to the Anti-Fraud

Anti-Fraud – it is a software complex for detecting gateways, based on analyzing
subscriber's behavior.
Anti-Fraud would not block if:
Real Subscriber:
- Calls from different locations;
- Calls limited number of
subscribers (family);
- Uses 1 Sim Card;
- Send SMS

To fight Anti-Fraud you will need many gateways in a different cells
Anti-Fraud
Basic principles of work
Anti-Fraud can analyze:
Lots of outgoing calls
in a short period of time
to the different
numbers

Absence of incoming
traffic and no
operator's
services usage

Sim-card profile
analyzing

Auto-pro-ring

Anti-Fraud is dangerous for a whole SIM cards series, which was activated from one
place in a short time period
Anti-Fraud
IMSI

MCC - mobile country code
An IMSI is usually presented as a 15 digit long
number, but can be shorter.

MNC - mobile network code
MSIN - mobile subscription
identification number

IMSI - International Mobile Subscriber Identity
Anti-Fraud
Key blocking methods
Sim-card stops to
register in
GSM networks

Sim-card is forbidden
to make
outgoing calls
Part IV

Anti-AntiFraud
Sim-box
What's that?
It is one of the hardware modules of GSM termination equipment.

Functions:
1. To make a Sim-card not plugged into the gateway
2. Possibility to use a lot of Sim-cards
3. Possibility to register a Sim-card on a specific gateway via Internet

The main function of this element is to store the array of Sim-cards, which take part in IPtelephony.
Anti Anti-Fraud
What for do we need it:

We will need a lot of Sim-cards, which could move between the gateways, would make a
limited number of calls, receive incoming calls and use operator's services (SMS, Internet)
Anti Anti-Fraud
Processes
The key task of Anti Anti­Fraud system is to hide gateways and 
imitate that Sim­cards are acting like a real subscribers.

Sim-Rotation

Sim-Migration

SIM cards within each sim-box can be
divided into groups, each
of these groups can assigned to a Separate
GSM-module of VoIP-gateway.
Over time, the system is able to make changes
within each group, changing sim-card
which is responsible
for making voice calls from one to another

CDR – Call Detail Record

If you have several GSM-gateways
located in different parts
of the city, system will make
SIM card to make calls from every
gateway by turn, creating an illusion of
subscriber movement, thus helping to protect
your cards from blocking by the
mobile operator
Anti Anti-Fraud
Anti-Spam

Anti-Spam

Analyzing calls, which are
going through the soft
switch

Identifying numbers, which
are making calls, to which numbers
they're calling and analyzing calls
frequency

Helps to include numbers to
black, white or gray lists
Part V

ANTRAX
Solution
ANTRAX Solution
HW and SW Solution for business
Our ANTRAX Solution consist of:

1. Sub Rack 2. Sim board

3. GSM board 4. Sim Server 5. GUI
ANTRAX Solution
Specification
It is a hardware module of Antrax system with 15
universal slots.
It acts as a switch on the Ethernet level for GSM
and/or Sim -modules
This hardware component consist of two GSM modules
(we have 2 active channels)
This HW component may contain up to 20 Sim-cards

It is a set of tools (scripts and algorithms) which forms
the basis of Anti Anti-Fraud system

Graphical User Interface. Which gives you an ability to
control your sims in one click
Thank you !

More Related Content

What's hot

STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Comsec
 
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS GatewaysMatrix Comsec
 
Transitioning Business Telephony From Legacy To Vo Ip Graphics
Transitioning Business Telephony From Legacy To Vo Ip   GraphicsTransitioning Business Telephony From Legacy To Vo Ip   Graphics
Transitioning Business Telephony From Legacy To Vo Ip Graphicsmwiles
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...Alex Tan
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedSyniverse
 
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...Matrix Comsec
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & ImplementationAhmed A. Arefin
 
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI GatewayMatrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI GatewayMatrix Comsec
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing BasicsShilpin Pvt. Ltd.
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Videoguy
 
Web-controlled Car Poster
Web-controlled Car PosterWeb-controlled Car Poster
Web-controlled Car PosterSamantha Luber
 
NFC-based User Authentication Mechanisms for Personalized IPTV Services
NFC-based User Authentication Mechanisms for Personalized IPTV ServicesNFC-based User Authentication Mechanisms for Personalized IPTV Services
NFC-based User Authentication Mechanisms for Personalized IPTV ServicesChun-Kai Wang
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz
 
Remote setup guide
Remote setup guideRemote setup guide
Remote setup guideVoicent
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)Ahmed Ayman
 

What's hot (20)

STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFX - Fixed VoIP to FXO-FXS Gateways
 
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
 
Transitioning Business Telephony From Legacy To Vo Ip Graphics
Transitioning Business Telephony From Legacy To Vo Ip   GraphicsTransitioning Business Telephony From Legacy To Vo Ip   Graphics
Transitioning Business Telephony From Legacy To Vo Ip Graphics
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing Explained
 
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
 
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI GatewayMatrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing Basics
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
 
Web-controlled Car Poster
Web-controlled Car PosterWeb-controlled Car Poster
Web-controlled Car Poster
 
NFC-based User Authentication Mechanisms for Personalized IPTV Services
NFC-based User Authentication Mechanisms for Personalized IPTV ServicesNFC-based User Authentication Mechanisms for Personalized IPTV Services
NFC-based User Authentication Mechanisms for Personalized IPTV Services
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud
 
Remote setup guide
Remote setup guideRemote setup guide
Remote setup guide
 
Polnet acp data sheet
Polnet acp data sheetPolnet acp data sheet
Polnet acp data sheet
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 

Viewers also liked

Atrax presentation for clients 17-march-2014
Atrax presentation for clients 17-march-2014Atrax presentation for clients 17-march-2014
Atrax presentation for clients 17-march-2014Flames Group
 
Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Flames Group
 
Antrax power point presentation_for clients_01-apr-2014
Antrax power point presentation_for clients_01-apr-2014Antrax power point presentation_for clients_01-apr-2014
Antrax power point presentation_for clients_01-apr-2014Flames Group
 
Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Flames Group
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksJamal Meselmani
 

Viewers also liked (6)

Atrax presentation for clients 17-march-2014
Atrax presentation for clients 17-march-2014Atrax presentation for clients 17-march-2014
Atrax presentation for clients 17-march-2014
 
Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014
 
Antrax power point presentation_for clients_01-apr-2014
Antrax power point presentation_for clients_01-apr-2014Antrax power point presentation_for clients_01-apr-2014
Antrax power point presentation_for clients_01-apr-2014
 
Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014Antrax power point presentation for clients_25-march-2014
Antrax power point presentation for clients_25-march-2014
 
Gsm1368
Gsm1368Gsm1368
Gsm1368
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
 

Similar to Presentation antrax 30.10.13

Coral gsm cdma gateway
Coral gsm cdma gatewayCoral gsm cdma gateway
Coral gsm cdma gatewayMohd Arif
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesEngr.MEESHU SHARKER
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Страх и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахСтрах и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахPositive Hack Days
 
GSM - Global System For Mobile Communication
GSM - Global System For Mobile CommunicationGSM - Global System For Mobile Communication
GSM - Global System For Mobile CommunicationDhara Joshi
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSPY24
 
The sim company mvno.pptx
The  sim company mvno.pptxThe  sim company mvno.pptx
The sim company mvno.pptxDinesh Patel
 
Nexge Technologies - MVNx Offerings
Nexge Technologies - MVNx OfferingsNexge Technologies - MVNx Offerings
Nexge Technologies - MVNx OfferingsNitin Raj Gupta
 

Similar to Presentation antrax 30.10.13 (20)

Coral gsm cdma gateway
Coral gsm cdma gatewayCoral gsm cdma gateway
Coral gsm cdma gateway
 
Gsm PRI Gateway
Gsm PRI GatewayGsm PRI Gateway
Gsm PRI Gateway
 
GSM Rating Overview
GSM Rating OverviewGSM Rating Overview
GSM Rating Overview
 
GSM
GSMGSM
GSM
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
GSM Fundamentals
GSM FundamentalsGSM Fundamentals
GSM Fundamentals
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
 
Gsm for-dummies
Gsm for-dummiesGsm for-dummies
Gsm for-dummies
 
Gsm1
Gsm1Gsm1
Gsm1
 
Страх и ненависть в телеком-операторах
Страх и ненависть в телеком-операторахСтрах и ненависть в телеком-операторах
Страх и ненависть в телеком-операторах
 
GSM - Global System For Mobile Communication
GSM - Global System For Mobile CommunicationGSM - Global System For Mobile Communication
GSM - Global System For Mobile Communication
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
Project Report
Project ReportProject Report
Project Report
 
The sim company mvno.pptx
The  sim company mvno.pptxThe  sim company mvno.pptx
The sim company mvno.pptx
 
Nexge Technologies - MVNx Offerings
Nexge Technologies - MVNx OfferingsNexge Technologies - MVNx Offerings
Nexge Technologies - MVNx Offerings
 
Final gsm1
Final gsm1Final gsm1
Final gsm1
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Presentation antrax 30.10.13

  • 2. Part I What is Voice transit?
  • 3. Origination and Termination Processes Scheme Call origination process Transit Operators Voice Traffic Termination Operator B Subscriber B Subscriber A Operator A Call termination process The call termination process is totally different from the call origination process
  • 4. Main types of operators National operators Land-line operators Licensed Mobile Operators (CDMA, GSM) Large Transit (VoIP) Operators GSM Terminators Small Transit (VoIP) Operators VoIP: subscribers are connected via soft-phones or calling cards Types of inter-operator connections (physical level): copper, optics, Ethernet
  • 5. Transit operators Key occurrence reasons Technological We couldn't call to another continent using only a cable Political Different countries, each of them have it's own policy Commercial The government prohibit operators to connect directly Personal wealth Management companies need to earn profit
  • 6. Tarification Main principles Long distance tarification International tarification Dial code Description Price Valid Date Tarification 38 Ukraine 0.15 USD 1.1.2000 1/1 38 067 38 097 38 096 Ukraine Kyivstar 0.10 USD 1.1.2001 1/1 38 050 Ukraine MTS 0.08 USD 1.1.2005 1/1 0/1/1 – per second 0/60/60 – per minute tarification tarification 60/60 tarification principle uses only in Mexico
  • 7. Routing Example This is a process of choosing the route for the voice call The process is based on tariff differences and quality of the route Subscriber A Operator A Transit Operators Operator B Subscriber B
  • 8. Voice over Internet Protocol History VoIP technology occurred in the early 2000. It was a behavior of the telecommunications industry and the openness and freedom of the Internet that brought this technology to the forefront of communications. And, it will be the economic forces that provide the motivation for companies to develop and use VoIP technology. By 2000, VoIP calls accounted for 3% and by 2003 that number had jumped up to 25%
  • 9. Income distribution Among the telecom operators Cost 0.50 $/min 0.10 $/min 0.25 $/min 0.20 $/min 0.17 $/min 0.15 $/min Operator A Operator B Margin 0.05$/min Subscriber A Margin: 0.25$/min 0.00 $/min Margin 0.03$/min Margin 0.02$/min Transit Operators Margin 0.05$/min Margin: 0.10$/min Subscriber B Transit operators do not have their own subscriber base
  • 10. Routes quality Main Indicators ACD ASR PDD Answer Post Call Seizure Dialing Duration Ratio Delay Good ACD = 3 – 4 minutes DTMF FAX Calling Average CLI Dual-tone Short for Line multi- facsimile Identificat frequency (T.38 ion signaling protocol) Good PDD is less then 300 ms Good ASR = 30 – 50%
  • 11. Quality of the routes Main definitions Premium quality TDM quality Retail quality The route with absolute quality: DTMF, CLI, FAX, reasonable PDD The route shows high quality: It is “pig in a poke”. Good ASR, ACD, PDD. CLI might be hidden All indicators should be checked twice; CLI, FAX, DTMF optionally Direct quality GSM quality Wholesale quality Obviously it is a route from the direct supplier Route provided through GSMgateways Low-quality routes. No CLI, DTMF, FAX options. FAS could be expected FAS – False Answer Supervision
  • 12. Traditional Call Scheme Here we can see call scheme with no FAS
  • 13. FAS False Answer Supervision False Answer/False Ring Early Answer Late Disconnect False answers occur when a carrier deliberately charges a connection period while in reality the call was not connected to the destination.
  • 14. Soft Switch Most popular among CIS operators are: ”Mera” and “Asterisk”
  • 15. Soft Switch Billing Operator A SIP Operator B SIP/H.323 Protocol converter Billing server Main functions: PSTN GSM network Virtual Office IP-PBX Operator C H.323 Billing Server operates the Soft Switch - Authentication; - Authorization; - Accounting; - Routing; - Statistics; - Billing.
  • 17. GSM Network Architecture Scheme Base Station Base Station Controller The “intelligent” part of the base station subsystem. Performs radio channels management Cell – is the smallest radio coverage area in the network LA – Location Area (a group of cells)
  • 18. GSM Network Architecture Scheme HLR – Home Location Register AuC – Authentication Center VLR - Visitor Location Register EIR – Equipment Identity Register MSC – Mobile Switching Center
  • 19. GSM Carrier Frequencies GSM networks use various bandings, or in other words different Wave streghts/lenghts/frequecies to provide their services GSM 900, is where the specific mobile carrier uses, 900Mhz as the wave length, or banding for its services. This is one of the lowest of todays commercial communication services GSM 1800 networks use a wide range of signals, starting from 800 MHz and then 1700 MHz or else 1800 MHz at a maximum GSM 900/1800 network - it is a single network with a common structure, logic, and monitoring where the phone is not switching GSM-900 and GSM-1800 are used in most parts of the world: Europe, Middle East, Africa, Australia and most of Asia. In South Americas it is in Costa Rica (GSM-1800), Brazil (GSM-850, 900 and 1800), Guatemala (GSM-850, GSM-900 and 1900), El Salvador (GSM-850, GSM-900 and 1900).
  • 20. GSM Gateway What is it? A VoIP GSM Gateway enables direct routing between IP, digital, analog and GSM networks Through least cost routing the gateways select the most Cost-effective telephone connection With these devices (fixed cellular terminals) companies can significantly reduce the money they spend on telephony, especially the money they spend on calls from IP to GSM They check the number which is dialed as well as rate information which is stored in an internal routing table The core idea behind cost saving with VoIP GSM Gateways is Least Cost Routing (LCR)
  • 21. Gateway Where does the Internet occur? Subscriber A Subscriber B INTERNET Operator B Operator A Copper connection Transit operator 1 Gateway VoIP Transit operator Optical connection Transit operator 2 TDM connection IP connection Transit operator 3 Transit operator 4 Ethernet connection Internet is most common to appear while call is transmitting between transit operators
  • 22. GSM Gateway Where is it? When using a gateway you can save money due to calls organizing between subscribers without use of fixed-line operators
  • 23. GSM Gateway Examples of use 1. How do call centers use the gateway: Internal subscribers PBX with support of SIP or H.323 Gateway GSM subscriber 2. How do companies use the gateway: Internal subscriber PBX with support of SIP or H.323 VoIP gateway addresses a request to PBX that: ● ● ● Dials GSM number of the subscriber through the gateway; Calls the requested extension number; If both sides answered, GW establish a voice connection. GSM subscriber There are several types of network, connected with the gateway: ● ● ● GSM and IP (VoIP) networks; PSTN and VoIP networks; PSTN and GSM networks;
  • 24. GSM Gateway Architecture GSM Gateways are usually using by offices, call centers and gsm terminators. Usually GSM Gateways are placed to the space with limited human access and in different cells (ex: Data Centers, lofts, etc.)
  • 25. GSM Gateway Net Tariffs Transit operators Subscriber A 0.40$/ min 0.20$/ min Operator A Margin: 0.05$/min Margin: 0.20$/min 0.05$/ min Margin: 0.05$/min 0.10$/ min Gateway Margin: 0.05$/min Operator B Margin: 0.05$/min 0.15$/ min (with Sim-cards) Margin: 0.10$/min Net tariffs 0.00$/ min 0.00$/ min Subscriber B Subscriber B When terminator diverts call to subscriber B and use only operator's B network, he will have a net tariffs
  • 27. Anti-Fraud What's that? If gateway acts not like a human, it becomes a target to the Anti-Fraud Anti-Fraud – it is a software complex for detecting gateways, based on analyzing subscriber's behavior.
  • 28. Anti-Fraud would not block if: Real Subscriber: - Calls from different locations; - Calls limited number of subscribers (family); - Uses 1 Sim Card; - Send SMS To fight Anti-Fraud you will need many gateways in a different cells
  • 29. Anti-Fraud Basic principles of work Anti-Fraud can analyze: Lots of outgoing calls in a short period of time to the different numbers Absence of incoming traffic and no operator's services usage Sim-card profile analyzing Auto-pro-ring Anti-Fraud is dangerous for a whole SIM cards series, which was activated from one place in a short time period
  • 30. Anti-Fraud IMSI MCC - mobile country code An IMSI is usually presented as a 15 digit long number, but can be shorter. MNC - mobile network code MSIN - mobile subscription identification number IMSI - International Mobile Subscriber Identity
  • 31. Anti-Fraud Key blocking methods Sim-card stops to register in GSM networks Sim-card is forbidden to make outgoing calls
  • 33. Sim-box What's that? It is one of the hardware modules of GSM termination equipment. Functions: 1. To make a Sim-card not plugged into the gateway 2. Possibility to use a lot of Sim-cards 3. Possibility to register a Sim-card on a specific gateway via Internet The main function of this element is to store the array of Sim-cards, which take part in IPtelephony.
  • 34. Anti Anti-Fraud What for do we need it: We will need a lot of Sim-cards, which could move between the gateways, would make a limited number of calls, receive incoming calls and use operator's services (SMS, Internet)
  • 35. Anti Anti-Fraud Processes The key task of Anti Anti­Fraud system is to hide gateways and  imitate that Sim­cards are acting like a real subscribers. Sim-Rotation Sim-Migration SIM cards within each sim-box can be divided into groups, each of these groups can assigned to a Separate GSM-module of VoIP-gateway. Over time, the system is able to make changes within each group, changing sim-card which is responsible for making voice calls from one to another CDR – Call Detail Record If you have several GSM-gateways located in different parts of the city, system will make SIM card to make calls from every gateway by turn, creating an illusion of subscriber movement, thus helping to protect your cards from blocking by the mobile operator
  • 36. Anti Anti-Fraud Anti-Spam Anti-Spam Analyzing calls, which are going through the soft switch Identifying numbers, which are making calls, to which numbers they're calling and analyzing calls frequency Helps to include numbers to black, white or gray lists
  • 38. ANTRAX Solution HW and SW Solution for business Our ANTRAX Solution consist of: 1. Sub Rack 2. Sim board 3. GSM board 4. Sim Server 5. GUI
  • 39. ANTRAX Solution Specification It is a hardware module of Antrax system with 15 universal slots. It acts as a switch on the Ethernet level for GSM and/or Sim -modules This hardware component consist of two GSM modules (we have 2 active channels) This HW component may contain up to 20 Sim-cards It is a set of tools (scripts and algorithms) which forms the basis of Anti Anti-Fraud system Graphical User Interface. Which gives you an ability to control your sims in one click