This document describes basic concepts related to routing calls in a telecommunications network, including call source, route selection source name (RSSN), route selection name (RSN), and their relationships. It discusses how different call sources with different RSSNs can be routed to different routes despite having the same call prefix. It also provides an example of how call blocking from a particular call source is implemented and how transit calls between public land mobile networks can be blocked.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
An introduction to Cellular communications Signaling, Specifically LTE Signaling.
Introducing 3GPP approach to handover and handoff mechanisms.
LTE architecture by alcatel-lucent included in this presentation.
This presentation focuses on mobility management protocols such as GTP-C and GTP-U.
Soft x3000 operation manual configuration guide. Part replacement is risky. Before the operation, you must estimate whether the risk can
be controlled with some technical protection measures without powering off the
equipment. If so, you can carry out the replacement; if not, contact the regional office of
Huawei immediately for technical support.After taking corresponding protection measures, you can carry out the replacement
operations by following the procedures stipulated in this manual, for example, pulling
out a board, inserting a board, or setting dual-inline package (DIP) switches of a board.
To make sure the security, only professionals who have been trained can replace the
parts which can be replaced only when the back door of the cabinet is open, because
the power distribution box and service frames are with -48V power terminals.
Notes on Equipment Security
Do not pull out two or more than two UPWRs in one frame simultaneously; otherwise,
the running UPWRs in the frame will be overloaded or even burnt.
Never insert UPWRs of different types into the same frame. The UPWR has two types:
a and b. If the UPWRs of different types are inserted in one frame, the current supplied
by various UPWRs is not even, and the UPWR supplying more current will be
overloaded or even burnt.
Complete the replacement of a fan box within five minutes; otherwise, the security and
normal operation of the corresponding service frame will be greatly affected.
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Soft x3000 operation manual configuration guide. Part replacement is risky. Before the operation, you must estimate whether the risk can
be controlled with some technical protection measures without powering off the
equipment. If so, you can carry out the replacement; if not, contact the regional office of
Huawei immediately for technical support.After taking corresponding protection measures, you can carry out the replacement
operations by following the procedures stipulated in this manual, for example, pulling
out a board, inserting a board, or setting dual-inline package (DIP) switches of a board.
To make sure the security, only professionals who have been trained can replace the
parts which can be replaced only when the back door of the cabinet is open, because
the power distribution box and service frames are with -48V power terminals.
Notes on Equipment Security
Do not pull out two or more than two UPWRs in one frame simultaneously; otherwise,
the running UPWRs in the frame will be overloaded or even burnt.
Never insert UPWRs of different types into the same frame. The UPWR has two types:
a and b. If the UPWRs of different types are inserted in one frame, the current supplied
by various UPWRs is not even, and the UPWR supplying more current will be
overloaded or even burnt.
Complete the replacement of a fan box within five minutes; otherwise, the security and
normal operation of the corresponding service frame will be greatly affected.
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Call Setup Success Rate Definition and Troubleshooting Assim Mubder
The CSSR indicates the probability of successful calls initiated by the MS. The CSSR is an important KPI for evaluating the network performance. If this KPI is too low, the subscribers are not likely to make calls successfully. The user experience is thus affected.
Leveraging Gap Assessments and Internal Audits in ISO 22301PECB
A focus on the strategic operation of the assessment and audit function of the BCMS to meet system goals and objectives, maintain conformance and leverage to enhance the awareness and benefits of the BCMS. Topics include the design and methodology of the internal audit plan and opportunities for using proven performance to promote awareness of the BCMS and quantify value of the system.
Main points covered:
• Gap Assessment and Internal Audit Plan
• Methodology
• Show ROI on performance
Presenter:
The presenter of this webinar will be Jan Decker. She is a Consultant in Emergency Management, Crisis Management and related Business Continuity plans, programs, and information systems. She is certified ISO 22301 Lead Implementer and Lead Auditor Trainer.
Link of the recorded session published on YouTube: https://youtu.be/7AyikpO6GLA
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
ISO 22301 Business Continuity ManagementRamiro Cid
Presentation of ISO 22301 Societal Security - Business Continuity Management Systems, main concepts, basic terms, content of the standard, clauses, mandatory documentation, related standards, comparision with BS25999-2, benefits of ISO 22301 implementation, etc.
ISO 22301: The New Standard for Business Continuity Best PracticeMissionMode
ISO 22301 is the new international standard for Business Continuity Management best practice. It provides organizations with a framework to manage risk and ensure that they can continue operations in any type of event. In this webinar, ISO 22301 expert John McGill will help you understand the ISO standard, why it's important, and how to plan for certification.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
2. Basic Concepts
Call Source
Call source refers to the subscriber or incoming trunk which initiate calls with the
same call process attributes
The call source name is obtained by checking the subscriber data table or trunk
group table according to the calling subscriber or the incoming trunk group
number.
Route Selection Source Name (RSSN)
It defines the category number of the routing policy for outgoing
calls from the call source (local subscribers or incoming trunks).
Same number prefix having different RSSN can be treated in
different way i.e. can be routed to different routes.
Definition: ADD CALLSRC, Use: ADD RTANA
3. Basic Concepts
Route Selection Name (RSN)
It defines a route selection strategy that the MSOFTX3000 uses to handle an
outgoing call.
Definition: ADD RTANA, Use: ADD CNACLD
Combination of RSSN and RSN defines one RT
RSN + RSSN RN
5. Basic Concepts
Important Features related to RSN, RSSN
1.
2.
3.
Same prefix from different call source (with different RSSN) can be routed to different
route.
Call block from particular call source.
Blocking Transit calls through BL network.
6. Same Call prefix to different Route
Basic Concepts
Using different RSSN for different Call source, one particular call prefix
from different call source can be routed to different Routes.
Use in BL network
Switch: MGKL01
Scenario: One BL subscriber under coverage of Khulna MSC calls a BL
subscriber at MGCT01. The call goes to TGDH01 and TGDH02 on 50-50
load share basis.
But if a GP subscriber of Khulna calls a BL subscriber at MGCT01, the call
is routed 50-50 load share to both Gateways.
7. Basic Concept
Incoming Call
Own PLMN
Trunk Group
Trunk Group
Table
Table
CALLSRN = BSC
TGDH01
TGDH01
TGDH02
TGDH02
RN=BL
RSSN = 0
SRT2
Call Prefix
CALLSRC
CALLSRC
Incoming Call
SRT1
GGDH01
GGDH01
SR
T2
CNACLD
CNACLD
GGDH02
GGDH02
RSSN
+ RSN
RN=PLMN
Trunk Group
Trunk Group
Table
Table
CALLSRN = GPKL01
RN
Other PLMN
SR
T1
Same Call prefix to different Route
RTANA
RTANA
(RSN)
RSSN = 10
(RSN)
Combination of (RSN, RSSN)
selects a particular Route (RT)
RSN + RSSN RT
Call Source
RSSN
Call Prefix
RSN
RN
BSC
0
019000207
BL_ROUTE
BL
GPKL01
10
019000207
BL_ROUTE
PLMN
8. Basic Call Block from Particular Call Source
Concepts
Define the call source with a RSSN which is not used normally,
for example, RSSN=5.
In Route Analysis table (RTANA), there is no entry for RSSN = 5. So, no Route (RT) is selected
and the call is dropped
As no RT is selected,
Incoming Call
Other PLMN
Trunk Group
Trunk Group
Table
Table
RSSN = 5
CALLSRC
CALLSRC
(RSSN)
(RSSN)
Call Prefix +
RSSN = 5
CNACLD
CNACLD
call is dropped
(Call prefix-> RSN)
(Call prefix-> RSN)
RSSN=5
+ RSN
GPDH01: IAM (Call Prefix)
RTANA
RTANA
(RSN)
(RSN)
No Match for RSSN = 5
So, No Route is selected
9. Transit call: Call from one PLMN is going to another PLMN using BL network
Blocking Transit call
CALLSRN:MGDH07
BL VMSC is
sending 018XX
Call Prefix
018xxxxx
CALLSRC
CALLSRC
CALLSRN:GPDH01
RSSN = 10
AKTEL Route
Route No = 201
CNACLD
CNACLD
AKTEL
RN
Trunk Group
Trunk Group
Table
Table
GP is sending 018XX
A party=017xxx
B party=018xxx
RSSN = 0
RSSN
+ RSN
Trunk Group
Trunk Group
Table
Table
• BL Calls can pass through the
RTANA table
• Call From GP fails to pass
RTANA due to different RSSN
which is not defined in RTANA
RTANA
RTANA
(RSN)
(RSN)
Call Source
RSSN
Call Prefix
RSN
Route
MGDH07
0
018
AKTEL_ROUTE
AKTEL
If we define RSSN 10 for RSN AKTEL_ROUTE, transit call will pass
to AKTEL
Lesson: Outgoing Routes to other PLMN should only pass RSSN=0
10. MSRN
MSRN Routes Routes are used to pass MSRN. own PLMN and other PLMN.
MSRN Routes should be accessible for
For own PLMN RSSN=0, for Other PLMN RSSN=10.
Perform RTANA for both RSSN=0 & 10.
BL Subscriber
dials 019XX
I
SR
MGDH07
GP is sending 019XX
A party=017xxx
B party=019xxx
PR
N
HLR
IAM
Route: B
L
MGCT01
Call from own PLMN and other PLMN
should pass MSRN Routes
Two entries are required in RTANA
Call Source
RSSN
Call Prefix
RSN
Route
BSC
0
019000207
BL_ROUTE
BL
GPKL01
10
019000207
BL_ROUTE
BL
If RTANA for RSSC 10 is not defined in MSRN Route, call from Other PLMN to that VMSC fails
11. One BL subscriber from Khulna
Same MSRN to Different MSC: goes directly viaVMSC calls a BL subscriber of
MGCT01. The call Example MGCT01
But if a GP subscriber of Khulna calls a BL subscriber of
MGCT01, the call is routed 50-50 load share to both Tandem MSC
BL Subscriber
dials 019XX
RSN = BL_ROUTE
Route = MGCT01
SRT = MGCT01
MGKL01
MGCT01
RSN = BL_ROUTE
RSN = BL_ROUTE
Route = PLMN
Route = PLMN
HLR
interrogation
GP subscriber call BL
A party=017xxx
B party=019xxx
SRT=GGDH01
SRT=GGDH02
HLR
GGDH01
GGDH02
Analysis Table
Call Source
RSSN
(BSC)
0
(GP)
10
Call Prefix
RSN
8801900207
BL_ROUTE
Route
Subroute-1
Subroute-2
MGCT01
MGCT01
X
PLMN
TGDH01
TGDH01