SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Extending the Life of your SS7 Network with SIGTRANAlan Percy
Since the late 1970’s SS7 have been the dominant signaling standard for the global PSTN, interconnecting service providers, ILECs, CLECs, and wholesale operators. With the advent of number portability, 800-toll-free, mobile wires and SMS, SS7 had adapted and carried the bulk of the signaling to make all these services possible.
Service providers have made a significant investment in this infrastructure and have made it clear to us that they need to maximize their investment going forward.
Today we’re going to share 5 ways to leverage SIGTRAN and STPs to extend the life of SS7 network infrastructure.
Extending the Life of your SS7 Network with SIGTRANTelcoBridges Inc.
Since the late 1970’s SS7 have been the dominant signaling standard for the global PSTN, interconnecting service providers, ILECs, CLECs, and wholesale operators. With the advent of number portability, 800-toll-free, mobile wires and SMS, SS7 had adapted and carried the bulk of the signaling to make all these services possible.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
Squire Technologies: Signal Transfer Point Presentation.
The SVI_STP provides a comprehensive future proof STP supporting legacy SS7 TDM, Next Generation IP SIGTRAN and IMS / LTE / 4G support. A mature, proven, carrier grade technology packed with feature rich capabilities derived from a decade of global deployments.
Shenzhen Sinovo Telecom co.,limited offers the next generation optical interconnect solutions for datacenter.We develop and manufacture innovative optical network devices, interconnection solutions, IDC optical modules and test equipment. The complete Series of 10G XFP,SFP+,GPON,100G CFP and 40G QSFP+ modules,and AOC Cables and other low rate modules,which widely used in fixed telecommunication networks, large Cloud computing and datacenter, IDC ,storage Computing network ,Video transmission, integrating systems,which meet various application requirements.
Network Transformation Best Practices-Working.pptxAlan Percy
Despite the wishes of the equipment makers and regulators, there still is a lot of TDM circuits and equipment in the global telecommunications network. How do we know? We talk to service providers every day that are working in mixed TDM and IP networks. What we have found is that Service providers are often challenged with navigating the complications of migrating their network to IP infrastructure, dealing with new regulatory mandates, replacing obsolete technologies, and finding the expertise to make the transition.
To help our customers make the transition, TelcoBridges has invited ZT Technology Solutions to join us as our newest Alliance Partner, bringing a host of experience in planning service provider migrations from TDM to IP.
During this event, we discuss our Network Transformation strategy, get to meet the team from ZT Technology Solutions and hear their FIVE best network transformation practices. Best of all, we have saved some time to answer your questions.
A recording is available at: https://youtu.be/WQjpTPNS4qM
The news regularly reports incidents of various fraud schemes that are perpetuated via the telecommunications network. A few months ago, a series of DDOS attacks impacted a major SIP service provider, overwhelming their network and blocking legitimate traffic. Meanwhile, illegal robocalls continue to take advantage of the elderly. Depending on the scheme, the fraud can harm both the service providers and the subscribers. In this "TelcoBridges Tech Talk", we’ll be reviewing the top 7 tactics to protect both service provider networks and their subscribers from fraud.
Video of presentation at: https://youtu.be/O5Hdw-c9rwg
With the recent announcement of collaboration between TelcoBridges and Metaswitch to certify Tmedia gateways for use with Metaswitch CFS, we imagine there are many questions. In this FAQ session we dig into some of the expected and unexpected questions on the announcement and plans going forward. Joining us is Austin Spreadbury, Senior Program Manager at Microsoft. Prior to the acquisition by Microsoft, Austin held a number of product management roles at Metaswitch.
Recording at: https://youtu.be/RRvAAjNXdEg
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
Illegal robocalls continue to be a significant problem for consumers and businesses of all sizes. STIR/SHAKEN is expected to reduce illegal spam calls, but those behind the illegal calls will persist, wasting time, clogging up phone lines, and in some cases, perpetrating phishing attacks. Join us as we discuss the current state of STIR/SHAKEN and explain why further Robocall Mitigation is required.
Stay with us as Gerry Christensen, VP of Business Development and Strategic Partnerships at YouMail joins us to share an AI-powered robocall analytics platform that can be used by service providers and enterprises to block much of the unwanted traffic.
Video recording of the session is available at:
https://www2.telcobridges.com/videolibrary
Contact Center as a Service - Challenges and Successes Alan Percy
Contact Centers as a Service opens a range of new opportunities for service providers, offering high-margin customer care applications and improved customer experience features to small and medium businesses. Service providers building or deploying a scalable and reliable CCaaS platform will surely face challenges. We know, because we've seen the hurdles and are going to share some really innovative solutions.
In this session, we talk with Jon Arnold, the principal at J Arnold & Associates, and a leading analyst covering the contact center market.
Robocall Mitigation with YouMail and ProSBCAlan Percy
In January of 2021, over 4 billion robocalls were placed, many were part of an international scam and designed to ensnare unwitting victims. Illegal robocalling continues to be the #1 consumer complaint to the FCC. To address this, the FCC has issued numerous orders, designed to stamp out illegal robocalling and protect US consumers from fraud and other various scams. One of these orders requires development of a robocall mitigation program at the originating service provider.
In this session, we are joined by Mike Rudolph, the CTO of YouMail, to learn about their AI-powered robocall sensor network, and show how service providers and enterprises can use YouMail along with ProSBC to quickly implement a highly-effective robocall mitigation program.
Links:
Full video: https://youtu.be/9BpuYSY4mR4
YouMail consumer call screening product: www.youmail.com
ProSBC Pricing and product information: www.prosbc.com
Implementation notes on TBwiki: https://docs.telcobridges.com/tbwiki/ProSBC:Youmail
Poor voice quality is one of the leading complaints for VoIP systems. Dropouts, echoes, static, and latency can ruin a conversation. Knowing how to measure voice quality and isolate the cause is an important part of delivering a quality experience to users and customers.
In this presentation, we share some background on voice quality in VoIP systems, examine the various causes of poor voice quality, and consider the role that SBCs can play in monitoring and isolating voice quality issues.
Questions covered in this session:
> Why is voice quality important to the customer experience?
> How is voice quality measured?
> What causes poor voice quality?
> How is voice quality measured on-the-fly?
> What is the role of SBCs in measuring voice quality?
> How do you isolate voice quality issues?
> Your questions
Who should attend:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Managing multiple SBCs across a complex network requires provisioning, coordination of routing-plans, performance monitoring and much more from a centralized network operations center. In this session, we take a look at using RESTful APIs as a means to manage SBCs - automating provisioning, configuration, diagnostics and other functions.
We'll also share stories from two ProSBC customers that have used RESTful APIs to manage their network configuration, making adding new subscribers easier and reducing the risk of fraud.
Building VoIP-based systems with SIP can be daunting. The entire telecommunications industry is a layered stack of technologies, some from the age of telephones with hand-cranks. Others from the Internet age of packet switching and VPNs.
Over the years, the experts at TelcoBridges have built a knowledge base about underlying telecommunications and VoIP technology, SIP signaling, networking products and design methods. In this event, we pull some of our favorite Frequently Asked Questions from our video library, our forum, Wiki, and your emails, sharing answers and insight that both beginners and advanced designers will find helpful.
A recording of the live webinar is available at:
https://www2.telcobridges.com/videolibrary
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
Unified Communications as a Service (or UCaaS), is a relatively new opportunity for service providers, making a complete business communications solution available from virtually anywhere and billed on a monthly basis, without the cost of on-premises equipment. The OPEX model makes UCaaS extremely popular with growing and distributed companies.
One of the popular software providers enabling the UCaaS market is 3CX, an open-standards communications solution. Service providers are discovering that deploying 3CX as a service is an excellent opportunity to grow their business, bringing business-class UCaaS to a range of vertical markets and geographies. As we’ll show today, TelcoBridges’ ProSBC offers a valuable set of capabilities to make hosted 3CX implementations secure, avoids on-premises CPE, is easy to manage and the subscription-based business model makes scaling easy and affordable.
In this recorded webinar, we are joined by Matt Ussery, CIO and founder of Austen Consultants, and take a closer look at how he built his successful hosted cloud service based on 3CX and ProSBC.
You can view the recording at: https://youtu.be/YX8C0UBtEec
Media gateways are a fundamental building block of voice communications networks, interconnecting legacy TDM voice networks and equipment with voice-over-IP networks. Found in service provider and enterprise networks, media gateways range in scale and capabilities, meeting a range of diverse applications. However, with the increasing adoption of SIP and VoIP networks, what role will media gateways play going forward? Will they become obsolete and join the VCR in the dustbin of technology? Or will they evolve to take on new roles in converged voice networks?
Welcome to “The Future of Media Gateways”, our 23rd monthly webinar, covering technical, business and partner topics to help service providers and enterprises build better voice networks.
During this session, we take a closer look at the market for media gateways, some recent innovations, and a number of new use cases. We’ll finish up with a summary of the media gateway portfolio from TelcoBridges and leave time for your questions.
The phones won’t stop ringing…or they don’t ring at all. Contact center agents waste time answering bogus calls while customers complain they can’t get through. 9-1-1 agents waste time answering robo-callers instead of dealing with real emergencies.
Telephony Denial of Service (TDOS) attacks clog up business telephone lines, causing disruption of business and wasting employee productivity. TDOS attacks can be the result of nefarious actors trying to extort money or a targeted grudge to settle, but also can be caused by rouge robocall campaigns, either way, TDOS attacks are becoming more common and difficult to prevent. Service providers are very often unprepared and unable to address TDOS attacks, leaving businesses vulnerable while they search for a solution.
Welcome to “How to Protect Against TDOS Attacks”, our 22nd monthly webinar in the FreeSBC/ProSBC series, covering technical, business and partner topics to help service providers and enterprises better secure their voice networks.
During this session, we describe methods that service providers and businesses can use to mitigate TDOS attacks, reducing or eliminating their impact. Toward the end of this session will also share three real end-customer case studies, showing how these businesses implemented their own TDOS solutions, deflecting hundreds of unwanted calls per day.
Microsoft's Azure is one of the top requested cloud platforms for communications solutions and a popular choice for hosting ProSBC and other cloud communications applications. During this session, we'll give a step-by-step tutorial and demonstration of the process to activate and configure ProSBC on Azure. At the conclusion of the tutorial, attendees will be prepared to provision ProSBC into their Azure communications solutions.
Topics covered in this session:
- Ordering process
- Selecting a processor
- Preparing the Azure account
- Preparing and Loading the ProSBC on Azure Image
- Activating the ProSBC Image
- Configuring and operating ProSBC
- Roadmap for ProSBC on Azure
- Your Questions
In this session we explore the future of new network services and how Universal CPE (uCPE) is used by service providers to combine many separate fixed-function network elements with a single multi-function device. Using virtualized network function software (VNFs) on Universal CPE, providers have a consistent and flexible foundation they can build on to offer new SD-WAN, SIP Trunking, and other services while improving network security with SBC and firewall VNFs.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
The programmable telephone network has always intrigued me. As a developer, having the ability to create custom applications within the service provider network seems to have endless possibilities. I can envision all sorts of applications that make businesses more productive and consumers better informed. I can also envision business opportunities for service providers, offering hosted development platforms that developers can use to create new customer-facing services.
Communications Platform as a Service (CPaaS) is a means to offer an open API-based development environment to businesses of all sizes, allowing them to build custom business applications to improve their customer experience and better secure their data. Today we plan to explore opportunities for CPaaS, explain how service providers can integrate CPaaS into their existing networks and review a live customer case study of CPaaS in action.
Slides from the June 4th, 2019 webinar, introducing ProSBC.
In October 2017, TelcoBridges took the bold step to offer FreeSBC, a software-based session border controller product, to the market. Since then, over 10 million sessions of FreeSBC software have been downloaded by thousands of users around the globe. Many of those sessions are now in production or various stages of evaluation. During that time, we at TelcoBridges have been listening carefully to customer feedback and working diligently on a product development roadmap to implement those suggestions. The result is ProSBC, an enhanced session border controller offering that fits many more use cases in both service provider and enterprise applications. Today - We’re pleased to share with you an overview of ProSBC, explain its features, capabilities, target markets and use cases.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. 2
Today’s Presenters:
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
Marc St-Onge
Technical Director of Sales
marc.stonge@telcobridges.com
4. TelcoBridges Inc.
• Manufacturer of VoIP gateways, signaling
gateways, and SBC software for carriers and
enterprises
• Employee Owned
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Montreal, Turkey, Hong Kong
• 24/7 technical support
4
TelcoBridges HQ
5. Worldwide Success
• Global carrier network solutions
• Focus on reliability and service
• Technology innovator
5
7. 7
SS7 is very much alive!
• It is the core of the global PSTN
• It ensures global voice & SMS connectivity
• And it is growing at 3 to 4% per year
SMS traffic is increasing
More roaming
Increasing number of MVNOs
Local number portability, 1-800 numbers
8. 8
Let’s Start at the Beginning…
Montreal Telephone Exchange (c. 1895)
9. 9
The Digital Telephone Network
The 1970s:
• Space Flight
• 1973 Oil Crisis
• Digital Computing Age
• Growth of Telephone Service
• Global Telecommunications
• Adoption of Digital Telephony
• Birth of CCITT SS7
10. 10
A Little Background
• Channel Associated Signaling (CAS)
• Signaling is carried with the voice path (analog, T1 RBS, E1 R2)
• Common Channel Signaling (CCS)
• Signaling is carried separate from the voice path (SS7)
Voice
Signaling
Voice
Signaling
11. 11
A Little Background
• Common Channel Signaling (SS7) Advantages:
• More efficient use of voice paths/circuit
• More bandwidth available for signaling
• More secure
• More flexible architectures
Voice
Signaling
12. 12
SS7 Service Switching Points
SSP
Voice Paths
Signaling Links
SSP
Service
Switching
Point (SSP)
Exchange A Exchange B
Link Set
From: Engineering Networks for Synchronization, CCS 7, and ISDN by P.K. Bhatnager
14. SS7 Signaling Transfer Point
• Signaling Transfer Point
• “Router” for SS7
messages
• Simplifies network
topology
• Allows “Spoke and Hub”
14
SSP
Voice/Data Paths
Signaling Links
SSP
Exchange A Exchange B
STP
Signaling
Transfer
Point SSP
Exchange C
15. SS7 Service Control Point
• SS7 Node that delivers a
service to network
• Database services:
• Caller Name database (CNAM)
• Local number portability
• Home Location Register (HLR)
• Toll Free Number database
• Messaging Services (SMS)
15
SCP
SSP
Voice/Data Paths
Signaling Links
SSP
Exchange A Exchange B
STP
Service
Control
Point
SSP
Exchange C
16. SS7 Protocol Stack
16
MTP Level 1
MTP Level 2
MTP Level 3
ISUP
Physical
Data link
Network
Application
Presentation
Session
Transport SCCP
TCAP
SS7
18. 18
SS7 Network Architecture
SSP C
STP 1
STP 2
SCP ASTP 3
STP 4 SCP B
SSP A
SSP B
A
A
A
A
C
F
B
DD
B
C
A
A
A
A
Voice circuit
SS7 link
SSP = Service Switching Point
STP = Signaling Transfer Point
SCP = Service Control Point
A = Access Link
B = Bridge Link
C = Cross Link
D = Diagonal Link
F = Fully Associated
- Class 5 switch
- Class 4 switch
- MSC
- LNP Database
- HLR
- SMSC
19. User
Application
19
SS7 Use Case: CNAM Lookup
Accessing Caller Name ID database
SCP
STP
CNAM
API
Terminating
Service Provider
CNAM
Gateway
21. SS7 Protocol Stacks
21
MTP Level 1
MTP Level 2
MTP Level 3
ISUP
Ethernet
IP
Physical
Data link
Network
Application
Presentation
Session
Transport
SCTP
M2PA
SCCP
TCAP
SIGTRANSS7
MTP Level 3
ISUP
SCCP
TCAP
Ethernet
IP
SCTP
M3UA
ISUP
SCCP
TCAP
22. SIGTRAN standards
• Defined by the IETF
• SCTP (Stream Control Transmission Protocol)
• RFC 4960
• Message oriented, reliable, in-sequence delivery
• Supports multi-homing for redundancy
• M2PA (MTP2 User Peer-to-Peer Adaptation Layer)
• RFC 4165
• Equivalent to SS7 TDM links, but over IP
• M3UA (MTP3 User Adaptation Layer)
• RFC 4666
• Enables the transport of higher-layer protocols over IP
22
23. 23
SIGTRAN Use Cases
1. Migrate SS7 TDM links to IP
2. Extend the life your STPs using SIGTRAN
3. Modernize your STPs
4. Bridge old and new SS7 networks
5. SS7 link transport via IP
https://www.youtube.com/watch?v=aUBj4GUFaiM
24. 1. SS7 link migration
24
- Eliminates recurring cost of leased line
- 100% transparent for the switch
- Higher reliability due to IP network
IP
network
Transmission
network
STP
STP
SS7
Switch
M3UAMTP2
TSG800
27. 27
Intro: Tsig TSG800
Signaling gateway/STP
• Up to 16 x T1/E1 for SS7 on TDM
• 6 x GigE ports for SIGTRAN, management, SNMP
• Redundant power supplies (DC or AC)
Low-speed
Links
High-speed
links
SIGTRAN
associations
MTP3
routes
SCCP/
GTT
MSU/s
64 2 64 512 384 5,000
28. 28
Learn More:
• More on SS7 at:
• https://docs.telcobridges.com/tbwiki/SS7
• Information on TSG800 at:
• https://www.telcobridges.com/products/
tsig-signaling-gateways/tsg800
• Request a consultation at:
• https://www2.telcobridges.com/SS7Consult
29. Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
29youtube.com/telcobridges
30. Enabling the Migration to
Cloud Communications
30
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
Editor's Notes
Some introductions to get started:
Joining us today is Marc Saint-Onge, Director of Sales Support for TelcoBridges. Marc has a long history with TelcoBridges, providing technical expertise and advice to customers across the globe. Marc, thanks for being a part of today’s event.
[Marc response]
And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.