SlideShare a Scribd company logo
www.TelecomTutorial.info
www.TelecomTutorial.info
Contents
Telecomtutorial.info
•VoWiFi Architecture
•Framework & Overview
•Various Options
•Untrusted
•Trusted
•IMS Direct Access
•3GPP Vs Non-3GPP Access
•VoWifi Nodes overview
www.TelecomTutorial.info
www.TelecomTutorial.info
VoWifi Architecture
1
SECTION
Type of
VoWifi
Access
Untrusted WLAN
Non-3GPP Access
(e.g. Home AP )A
SIM
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )B
SIM
IMS Direct Access
(e.g. Public AP )C
No SIM
www.TelecomTutorial.info
VoWiFi Architecture - Basics
Other PSTN /
Voice Network
PGw
EPC
Network
SBC &
P-CSCF
TAS
IMS
Network
ePDG
VoLTE
VoWifiInternet
CSCF
MRF
(e.g. Wifi in Home
Broadband )
SGW
• GSMAs : IR.51 , IR61
• 3GPP : TS 23.402
Trusted 3GPP
Access , Ex : LTE
• Non-3GPP
• Untrusted WLAN
www.TelecomTutorial.info
Overview of VoWifi Solution
Other PSTN /
Voice Network
PGw
EPC
SBC &
P-CSCF
TAS
IMS
ePDG
CSCF
MRF
Untrusted WLAN
Non-3GPP Access
(e.g. Home AP )A
SIM
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )
B
SIM
IMS Direct Access
(e.g. Public AP )C
No SIM
SGW
TWAG
www.TelecomTutorial.info
3GPP Vs Non-3GPP Access
3GPP Access
• 4G : E-UTRAN (LTE and LTE-Advanced)
• 2G : GERAN (GSM / GPRS radio access network)
• 3G : UTRAN (UMTS-based WCDMA and HSPA radio access
network)
Non-3GPP Access
• Fixed networks
• WiMAX
• CDMA2000
• WLAN
• etc ..
Trusted
Non-3GPP
Untrusted
Non-3GPP
www.TelecomTutorial.info
Non-3GPP : Trusted Vs Untrusted Access
Non-3GPP Access
• Fixed networks
• WiMAX
• CDMA2000
• WLAN
• etc ..
Trusted
Non-3GPP
Untrusted
Non-3GPP
www.TelecomTutorial.info
Type of Non-3GPP Access
Other PSTN /
Voice Network
PGw
EPC
SBC &
P-CSCF
TAS
IMS
ePDG
CSCF
MRF
Untrusted WLAN
Non-3GPP Access
(e.g. Home AP )A
SIM
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )
B
SIM
IMS Direct Access
(e.g. Public AP )C
No SIM
SGW
TWAG
www.TelecomTutorial.info
Selection Criteria
Untrusted WLAN
Non-3GPP Access
(e.g. Home AP )A
SIM
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )
B
SIM
IMS Direct Access
(e.g. Public AP )C
No SIM
Which one should be used ?
www.TelecomTutorial.info
Other Aspects of VoWifi
VoWifi
VoLTE
ePDG / TWAG
Continuity
CS Core
2G/3G
SRVCC
DRVCC
ANDSF
Access Network
Detection and
Selection Function
Handover
www.TelecomTutorial.info
www.TelecomTutorial.info
Untrusted WLAN Access
2
SECTION
Untrusted
WLAN
Access
ePDG
Untrusted WLAN
Non-3GPP Access
(e.g. Home AP )
SIM
A
www.TelecomTutorial.info
VoWiFi Architecture – Untrusted WLAN
PGw
EPC
Untrusted WLAN
(e.g. Home Wifi )
EnodeB
Packet Core
IMS Network
VoWifi + VoLTE
AAA
ePDG
Signaling &
Authentication
Interworking with
untrusted non-
3GPP networks
Voice
Packets
via IP
Signaling
Internet IPSEC Tunnel
for Security
VoLTE
VoWifi
A
www.TelecomTutorial.info
VoWiFi Architecture – Untrusted WLAN
PGw
EPC
SBC &
P-CSCF
TAS
IMS
ePDG
CSCF
MRF
Untrusted WLAN
(e.g. Home Wifi )
SGW
SWu
S2b
SWm
MME
AAA
SWx
HSS
PCRF
EnodeB
New Nodes
• ePDG
• 3GPP AAA
• VoWifi capable UE
Re-Use
Existing Nodes
• PGW
• HSS
• PCRF
• TAS & IMS Core
A
www.TelecomTutorial.info
Technology in Play – Untrusted WLAN
Wifi selection
• Handset / Operator Controlled
- ANDSF , Hotspot 2.0
Authentication
• SIM Card based Authentication
- EAP AKA , EAP Based
Quality of Service
• Prone to Congestion
• No End to End QOS on Internet
Security
• IPSEC tunnel between User and
ePDG
Handovers of VoWifi
• With VoLTE
• With 3G PS using DRVCC
A
www.TelecomTutorial.info
www.TelecomTutorial.info
Trusted WLAN
3
SECTION
Trusted
WLAN
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )
TWAG
B
www.TelecomTutorial.info
Other PSTN /
Voice Network
PGw
EPC
SBC &
P-CSCF
TAS
IMS
AAA
CSCF
MRF
Trusted WLAN
Non-3GPP Access
(e.g. Enterprise AP )
SIM
SGW
TWAG
Trusted WLAN Access - The TWAG
STa
S2a
B
www.TelecomTutorial.info
www.TelecomTutorial.info
Summary
www.TelecomTutorial.info
www.TelecomTutorial.info
3GPP TS 23.402
www.TelecomTutorial.info
www.TelecomTutorial.info
Re-Cap
VoWiFi Architecture - Basics
• VoWifi is all about accessing IMS infrastructure from Any type of Wifi ..
Unlicensed, untrusted and trusted Wifi networks
• VoWifi is covered under GSMA IR.51 , IR.61 & 3GPP’s TS 23.402
• VoWifi technology is now available on all Leading Operators
• VoWi-Fi is a complementary technology to VoLTE and utilizes IMS as
parent Technology
• There is deep integration between 4G VoLTE & VoWifi where calls are
seamlessly handed over between LTE and Wi-Fi and vice versa
www.TelecomTutorial.info
www.TelecomTutorial.info
Re-Cap
3GPP Vs Non-3GPP Access
• 3GPP Access supports existing 3GPP radio access networks which are
defined as part of 3GPP specifications , This includes
• E-UTRAN (LTE and LTE-Advanced)
• GERAN (GSM / GPRS radio access network)
• UTRAN (UMTS-based WCDMA and HSPA radio access network)
• The EPC Network also permits the interconnection of non-3GPP
technologies between the UE and the EPC Core
• Non-3GPP Access includes technologies such as Fixed networks, WiMAX,
cdma2000 , WLAN, etc..
• Non-3GPP accesses can be classified into two categories: Trusted accesses
and Untrusted accesses
www.TelecomTutorial.info
www.TelecomTutorial.info
Re-Cap
Untrusted WLAN
• No trust of Operator in Wifi Network and Its - Access Path
• Operator has no control over Wifi , for example , public hotspots
• The VoWifi Access from Home Broadband or DSL is classic example
• Traffic goes from UE to Internet & then it reaches Mobile Operator
Network
• Network would require UE to go through an additional authentication and
security process
• A special IP tunneling mechanism example IPSec for making it secure
• The service is offered to SIM based mobiles & Tabs where Complete
Authentication is done for users
www.TelecomTutorial.info
www.TelecomTutorial.info
Re-Cap
Key elements for VoWifi Service
New Nodes
• ePDG
• 3GPP AAA
• VoWifi & IPSEC capable UE
Re-Use Existing Nodes
• PGW with s2b Support
• HSS with SWx Support
• Re-use existing PCRF with VoWifi Support ( NPLI etc.. )
• IMS Core infrastructure with support for Wifi Access type
• TAS with support for Wifi Access type
www.TelecomTutorial.info
www.TelecomTutorial.info
Re-Cap
Trusted WLAN
• Trusted WLAN Wifi is managed or Controlled directly by the operator
• Classical Example is Corporate Operator Deployed Hotspots in Markets ,
Airports and Shopping Malls
• Uses 802.1x & EAP authentication method
• The UE is connected via TWAG (Trusted Wireless Access Gateway) in the
Wi-Fi core
• TWAG is then connected directly to the P-GW (Packet Gateway) in the
Evolved Packet Core (EPC) via GTP
• Here communication is happening using IMSI of user , therefor this
technique is Typically offered only to SIM based users, However there are
other ways of Authentication used by few Operators as well
www.TelecomTutorial.info
www.TelecomTutorial.info
Future Reading & References
- 3GPP TS 23.402
- Architecture enhancements for non-3GPP accesses
- Covers Complete Architecture in Detail , important Document for
enhancing knowledge on VoWifi
- 3GPP TS 33.402
- 3GPP System Architecture Evolution (SAE); Security aspects of non-
3GPP accesses
- Covers Security & Authentication related Call Flows
www.TelecomTutorial.info
Get PPT Now www. TelecomTutorial .infoVikas Shokeen
LIKE
COMMENTSHARE

More Related Content

What's hot

AIRCOM LTE Webinar 2 - Air Interface
AIRCOM LTE Webinar 2 - Air InterfaceAIRCOM LTE Webinar 2 - Air Interface
AIRCOM LTE Webinar 2 - Air Interface
AIRCOM International
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
3G4G
 
VoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVoLTE KPI Performance Explained
VoLTE KPI Performance Explained
Vikas Shokeen
 
Basic 5G.pdf
Basic 5G.pdfBasic 5G.pdf
Basic 5G.pdf
AnkushJuneja7
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
Karel Berkovec
 
Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel
Eiko Seidel
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
Justin MA (馬嘉昌)
 
Misc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5GMisc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5G
3G4G
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS Stack
Vikas Shokeen
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Zorays Solar Pakistan
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
Pei-Che Chang
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
Sarp Köksal
 
5G massive mimo & planning.pdf
5G massive mimo & planning.pdf5G massive mimo & planning.pdf
5G massive mimo & planning.pdf
bagusmardani1
 
Huawei ipran solution
Huawei ipran solutionHuawei ipran solution
Huawei ipran solution
Ahmed Sufi Kamal Ibne Ahsan
 
Lte training session_1
Lte training session_1Lte training session_1
Lte training session_1
Sajal Kumar Das
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
Vikas Shokeen
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
Vikas Shokeen
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
Mustafa Golam
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
Hamidreza Bolhasani
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
Qualcomm Research
 

What's hot (20)

AIRCOM LTE Webinar 2 - Air Interface
AIRCOM LTE Webinar 2 - Air InterfaceAIRCOM LTE Webinar 2 - Air Interface
AIRCOM LTE Webinar 2 - Air Interface
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
 
VoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVoLTE KPI Performance Explained
VoLTE KPI Performance Explained
 
Basic 5G.pdf
Basic 5G.pdfBasic 5G.pdf
Basic 5G.pdf
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
 
Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel Overview 5G NR Radio Protocols by Intel
Overview 5G NR Radio Protocols by Intel
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
Misc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5GMisc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5G
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS Stack
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
 
5G massive mimo & planning.pdf
5G massive mimo & planning.pdf5G massive mimo & planning.pdf
5G massive mimo & planning.pdf
 
Huawei ipran solution
Huawei ipran solutionHuawei ipran solution
Huawei ipran solution
 
Lte training session_1
Lte training session_1Lte training session_1
Lte training session_1
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
 

Similar to VoWifi 02 - VoWifi architecture overview (pdf ppt)

Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
Advantec Distribution
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
Advantec Distribution
 
PLNOG 21: Piotr Gruszczyński - WiFi_Calling
PLNOG 21: Piotr Gruszczyński - WiFi_Calling PLNOG 21: Piotr Gruszczyński - WiFi_Calling
PLNOG 21: Piotr Gruszczyński - WiFi_Calling
PROIDEA
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
Vikas Shokeen
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
Cisco Canada
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
AbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
AbyThomas54
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
MohammadRazavi18
 
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotTrack 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
ST_World
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
Rubab Fatima
 
Wireless World
Wireless World Wireless World
Wireless World
bhattsipl
 
Small cell technology in an enterprise application with VoLTE
Small cell technology in an enterprise application with VoLTESmall cell technology in an enterprise application with VoLTE
Small cell technology in an enterprise application with VoLTE
Small Cell Forum
 
Wi fi
Wi fiWi fi
Graduation projects
Graduation projectsGraduation projects
Graduation projects
Hossam Zein
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5G
ITU
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
Brian Ray
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
Divakar Triple H
 
South East Europe Rail conference - Norman Frisch
South East Europe Rail conference -  Norman FrischSouth East Europe Rail conference -  Norman Frisch
South East Europe Rail conference - Norman Frisch
Russell Publishing
 

Similar to VoWifi 02 - VoWifi architecture overview (pdf ppt) (20)

Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 
PLNOG 21: Piotr Gruszczyński - WiFi_Calling
PLNOG 21: Piotr Gruszczyński - WiFi_Calling PLNOG 21: Piotr Gruszczyński - WiFi_Calling
PLNOG 21: Piotr Gruszczyński - WiFi_Calling
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotTrack 3   session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iot
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Wireless World
Wireless World Wireless World
Wireless World
 
Small cell technology in an enterprise application with VoLTE
Small cell technology in an enterprise application with VoLTESmall cell technology in an enterprise application with VoLTE
Small cell technology in an enterprise application with VoLTE
 
Wi fi
Wi fiWi fi
Wi fi
 
Graduation projects
Graduation projectsGraduation projects
Graduation projects
 
Consideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5GConsideration of fixed mobile convergence in 5G
Consideration of fixed mobile convergence in 5G
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
South East Europe Rail conference - Norman Frisch
South East Europe Rail conference -  Norman FrischSouth East Europe Rail conference -  Norman Frisch
South East Europe Rail conference - Norman Frisch
 

More from Vikas Shokeen

Telco cloud 04 - Hypervisor vs Container
Telco cloud 04 - Hypervisor vs ContainerTelco cloud 04 - Hypervisor vs Container
Telco cloud 04 - Hypervisor vs Container
Vikas Shokeen
 
Telco Cloud 01 - Introduction to NFV
Telco Cloud 01 - Introduction to NFVTelco Cloud 01 - Introduction to NFV
Telco Cloud 01 - Introduction to NFV
Vikas Shokeen
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDN
Vikas Shokeen
 
Telco Cloud - 01. introduction to Telco cloud
Telco Cloud - 01. introduction to Telco cloudTelco Cloud - 01. introduction to Telco cloud
Telco Cloud - 01. introduction to Telco cloud
Vikas Shokeen
 
Telco Cloud 02 - Introduction to nfv
Telco Cloud 02 - Introduction to nfvTelco Cloud 02 - Introduction to nfv
Telco Cloud 02 - Introduction to nfv
Vikas Shokeen
 
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
Telco Cloud - 02. Introduction to NFV - Network Function VirtualizationTelco Cloud - 02. Introduction to NFV - Network Function Virtualization
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
Vikas Shokeen
 
Telco Cloud - 04. introduction to hypervisor , docker & container
Telco Cloud - 04. introduction to hypervisor , docker & containerTelco Cloud - 04. introduction to hypervisor , docker & container
Telco Cloud - 04. introduction to hypervisor , docker & container
Vikas Shokeen
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
Vikas Shokeen
 
VoLTE KPI Performance
VoLTE KPI PerformanceVoLTE KPI Performance
VoLTE KPI Performance
Vikas Shokeen
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
Vikas Shokeen
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
Vikas Shokeen
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
Vikas Shokeen
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
Vikas Shokeen
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
Vikas Shokeen
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
Vikas Shokeen
 

More from Vikas Shokeen (15)

Telco cloud 04 - Hypervisor vs Container
Telco cloud 04 - Hypervisor vs ContainerTelco cloud 04 - Hypervisor vs Container
Telco cloud 04 - Hypervisor vs Container
 
Telco Cloud 01 - Introduction to NFV
Telco Cloud 01 - Introduction to NFVTelco Cloud 01 - Introduction to NFV
Telco Cloud 01 - Introduction to NFV
 
Telco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDNTelco Cloud 03 - Introduction to SDN
Telco Cloud 03 - Introduction to SDN
 
Telco Cloud - 01. introduction to Telco cloud
Telco Cloud - 01. introduction to Telco cloudTelco Cloud - 01. introduction to Telco cloud
Telco Cloud - 01. introduction to Telco cloud
 
Telco Cloud 02 - Introduction to nfv
Telco Cloud 02 - Introduction to nfvTelco Cloud 02 - Introduction to nfv
Telco Cloud 02 - Introduction to nfv
 
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
Telco Cloud - 02. Introduction to NFV - Network Function VirtualizationTelco Cloud - 02. Introduction to NFV - Network Function Virtualization
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
 
Telco Cloud - 04. introduction to hypervisor , docker & container
Telco Cloud - 04. introduction to hypervisor , docker & containerTelco Cloud - 04. introduction to hypervisor , docker & container
Telco Cloud - 04. introduction to hypervisor , docker & container
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
 
VoLTE KPI Performance
VoLTE KPI PerformanceVoLTE KPI Performance
VoLTE KPI Performance
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

VoWifi 02 - VoWifi architecture overview (pdf ppt)