The document outlines an induction training for new network operations and maintenance staff. It includes details like:
- The training will last 3 days and cover topics like NGN protocols and H.248 call flow scenarios.
- Sessions will use methods like presentations, demonstrations, and question/answer to ensure understanding.
- Participants are expected to follow rules like silencing phones and focusing on the content.
This document discusses trends, challenges, and solutions for mobile backhaul networks. It outlines the rapid bandwidth growth requirements for LTE, higher service demands including enterprise services and security, and increased O&M challenges. Huawei's LTEhaul 2.0 solution is presented as addressing these issues through features like proactive O&M, SDN virtualization, seamless multicast, and carrier-grade security. Specific technologies like eMBMS, small cell backhaul, Ethernet demarcation services, and IPSec solutions are also summarized.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Achieving resilient and assured PNT in secure information networksADVA
Chuck Perry’s JNC session provided real-world information on how to synchronize secure defense information networks with resilient, assured PNT capabilities. He described sync strategies to prevent, defend, and mitigate GPS cyberthreats, with a focus on PNT services in mission-critical battlefield applications.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
This document discusses IMS ENUM and DNS mechanisms for mapping telephone numbers and SIP URLs. It contains the following information:
1. ENUM is defined as the E.164 Number Mapping that provides a system to unify telephone numbers with Internet addressing by mapping E.164 numbers to URIs like SIP.
2. When a UE invites another party using a SIP URL, DNS is used to resolve the URL to an IP address. But for TEL URLs, DNS cannot resolve it so ENUM is used to map the TEL URL to a SIP URL which can then be resolved.
3. If ENUM query for a TEL URL succeeds, the TEL URL is mapped to a SIP URL which
LTE network: How it all comes together architecture technical posterDavid Swift
The document provides an overview of an LTE network including:
1) The key components of an LTE network including the Evolved Packet Core (EPC), radio access network (eNodeB), and user equipment (UE).
2) Protocols and functions used within the LTE network for mobility, authentication, quality of service, charging, and multimedia services.
3) Interworking of the LTE network with external networks including legacy 3G networks, non-3GPP access like WiFi, IP Multimedia Subsystem (IMS) for voice, and IPX networks for roaming.
This document discusses trends, challenges, and solutions for mobile backhaul networks. It outlines the rapid bandwidth growth requirements for LTE, higher service demands including enterprise services and security, and increased O&M challenges. Huawei's LTEhaul 2.0 solution is presented as addressing these issues through features like proactive O&M, SDN virtualization, seamless multicast, and carrier-grade security. Specific technologies like eMBMS, small cell backhaul, Ethernet demarcation services, and IPSec solutions are also summarized.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Achieving resilient and assured PNT in secure information networksADVA
Chuck Perry’s JNC session provided real-world information on how to synchronize secure defense information networks with resilient, assured PNT capabilities. He described sync strategies to prevent, defend, and mitigate GPS cyberthreats, with a focus on PNT services in mission-critical battlefield applications.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
This document discusses IMS ENUM and DNS mechanisms for mapping telephone numbers and SIP URLs. It contains the following information:
1. ENUM is defined as the E.164 Number Mapping that provides a system to unify telephone numbers with Internet addressing by mapping E.164 numbers to URIs like SIP.
2. When a UE invites another party using a SIP URL, DNS is used to resolve the URL to an IP address. But for TEL URLs, DNS cannot resolve it so ENUM is used to map the TEL URL to a SIP URL which can then be resolved.
3. If ENUM query for a TEL URL succeeds, the TEL URL is mapped to a SIP URL which
LTE network: How it all comes together architecture technical posterDavid Swift
The document provides an overview of an LTE network including:
1) The key components of an LTE network including the Evolved Packet Core (EPC), radio access network (eNodeB), and user equipment (UE).
2) Protocols and functions used within the LTE network for mobility, authentication, quality of service, charging, and multimedia services.
3) Interworking of the LTE network with external networks including legacy 3G networks, non-3GPP access like WiFi, IP Multimedia Subsystem (IMS) for voice, and IPX networks for roaming.
2G / 3G / 4G / IMS / 5G Overview with Focus on Core NetworkHamidreza Bolhasani
The document provides an overview of mobile networks from 2G to 5G, with a focus on the core network. It describes the key network elements and protocols in 2G/3G networks such as BTS, BSC, NodeB, RNC, SGSN, GGSN. Example call flows and scenarios like location update and SMS are reviewed. GPRS network architecture is introduced including the functions of SGSN, GGSN, CG. Finally, it briefly introduces 5G services before concluding.
The document discusses key performance indicators (KPIs) for the E-UTRAN and EPC components of an LTE network, including accessibility, retainability, integrity, availability, and mobility metrics for E-UTRAN and accessibility, mobility, and utilization KPIs for EPC. It provides definitions and formulas for calculating various KPIs related to EPS attach success rate, dedicated bearer creation success rate, handover success rates, and other measures of network and service performance.
The document discusses international mobile roaming, including:
1. The different types of roaming agreements and their lifecycles, from establishing strategies and negotiating terms to testing, implementing, and ongoing monitoring.
2. Key roaming management tasks like internal processes and interfaces with external partners.
3. Common bottlenecks that can occur during negotiation, testing, go-live, and ongoing operations, and ways to avoid them like clear processes, priorities, resources, and potentially outsourcing some functions.
Close coordination is needed across the departments involved to successfully establish and maintain roaming partnerships.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Huawei hss9860 v900 r008c20 production descriptionRabih Kanaan,PMP
Huawei HSS9860 stores and manages identities, authentication data, subscription information, and location information about subscribers. In addition, the HSS9860 verifies mobile terminals when mobile terminals attempt to connect to networks.
The HSS9860 implements the following functions:
Home location register (HLR) in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) networks
Equipment identity register (EIR) in GSM, UMTS, and EPS networks.
Home subscriber server (HSS) in evolved packet system (EPS) networks
HSS, subscription locator function (SLF), E.164 number to URI mapping (ENUM), or domain name server(DNS) in IP multimedia subsystems (IMS).
GSM, UMTS, EPS, and IMS networks are 3GPP access networks while CDMA, WLAN, WiMax, and ADSL are non-3GPP access networks.
Lte training an introduction-to-lte-basicsSaurabh Verma
The document provides an overview of LTE (Long Term Evolution) technology. It discusses that LTE was standardized by 3GPP in 2008 to improve the performance and efficiency of wireless networks. Key aspects of LTE include the use of OFDMA for downlink and SC-FDMA for uplink, support for flexible bandwidths, and an evolved packet core network architecture. LTE aims to provide higher speeds, lower latency, and more efficient use of spectrum compared to previous 3G technologies.
The document discusses next generation networks (NGN) and IP Multimedia Subsystem (IMS). NGN aims to converge different access networks onto a single all-IP infrastructure to seamlessly deliver multimedia services. IMS is an architectural framework for delivering IP-based services to users on both fixed and mobile networks. It provides session control functions and enables real-time multimedia services like voice and video over packet networks.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
The document describes several registration and de-registration flows for IP Multimedia Subsystem (IMS). The key steps are:
1. For registration, the UE requests P-CSCF information from DHCP and DNS servers, then sends a register request to the P-CSCF which assigns a S-CSCF and retrieves the user profile from HSS.
2. Periodic re-registration follows the same process to refresh the registration.
3. For de-registration, the UE or network send a register request with expiration time of zero, removing the registration.
The document discusses key technologies in LTE including access techniques, MIMO, scheduling, link adaptation, and HARQ. It covers OFDM and SC-FDMA used for downlink and uplink access, benefits of MIMO including improved SINR and shared SINR through modes like transmit diversity, receive diversity, and spatial multiplexing. Scheduling considers factors like CQI and aims for fairness and throughput. Link adaptation uses CQI and MCS to optimize air interface efficiency. HARQ enables recovery of errors at the MAC layer through retransmissions.
This document discusses various types of call forwarding in 3 sentences:
It describes unconditional and conditional call forwarding scenarios as well as no reply, busy, and not reachable scenarios. The state transition models show the signaling flows between network elements like the GMSC, HLR, MSC, and VLR when a call is forwarded due to various conditions like absent subscriber, no reply, radio congestion, or detachment. Registration, erasure, activation, and deactivation functions are also covered with regard to managing call forwarding numbers and services.
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
The document discusses the framing structure of SDH and various alarms that can occur in SDH networks. It explains the hierarchy from STM-1 frame down to VC-4 and tributary unit levels. It then describes alarms like LOS, LOF, LOP that can happen at different levels due to issues like signal loss, missing frames, or lost pointers. It also covers alarms for indicating defects or errors like AIS, RDI, REI, BIP and methods for error monitoring using bytes in the SDH frame.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
This document describes basic concepts related to routing calls in a telecommunications network, including call source, route selection source name (RSSN), route selection name (RSN), and their relationships. It discusses how different call sources with different RSSNs can be routed to different routes despite having the same call prefix. It also provides an example of how call blocking from a particular call source is implemented and how transit calls between public land mobile networks can be blocked.
The document describes the Cisco SPA 303 3-Line IP Phone. It has 3 lines, a LCD screen, speakerphone, and connects directly to an IP PBX or internet telephone service. It supports SIP and SPCP protocols and has features like caller ID, conferencing, provisioning and security. It is designed for businesses and home offices to make and receive calls over an IP network.
Introduction to Programmable Networks by Clarence Anslem, IntelMyNOG
This document discusses programmable networks and introduces key concepts:
- Programmable networks allow for innovation by enabling the writing of packet processing algorithms rather than relying on fixed-function hardware. This is done through programmable switches and protocol-independent packet processors.
- P4 is a language that allows defining packet parsing, headers, tables, and processing logic in a target-independent way. It enables protocol and target independence.
- Programmable switches implement the PISA model with a parser, match-action tables, and deparser. They can be programmed through a P4 program that is compiled for the target hardware.
- Example applications discussed are in-band network telemetry and 5G
2G / 3G / 4G / IMS / 5G Overview with Focus on Core NetworkHamidreza Bolhasani
The document provides an overview of mobile networks from 2G to 5G, with a focus on the core network. It describes the key network elements and protocols in 2G/3G networks such as BTS, BSC, NodeB, RNC, SGSN, GGSN. Example call flows and scenarios like location update and SMS are reviewed. GPRS network architecture is introduced including the functions of SGSN, GGSN, CG. Finally, it briefly introduces 5G services before concluding.
The document discusses key performance indicators (KPIs) for the E-UTRAN and EPC components of an LTE network, including accessibility, retainability, integrity, availability, and mobility metrics for E-UTRAN and accessibility, mobility, and utilization KPIs for EPC. It provides definitions and formulas for calculating various KPIs related to EPS attach success rate, dedicated bearer creation success rate, handover success rates, and other measures of network and service performance.
The document discusses international mobile roaming, including:
1. The different types of roaming agreements and their lifecycles, from establishing strategies and negotiating terms to testing, implementing, and ongoing monitoring.
2. Key roaming management tasks like internal processes and interfaces with external partners.
3. Common bottlenecks that can occur during negotiation, testing, go-live, and ongoing operations, and ways to avoid them like clear processes, priorities, resources, and potentially outsourcing some functions.
Close coordination is needed across the departments involved to successfully establish and maintain roaming partnerships.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Huawei hss9860 v900 r008c20 production descriptionRabih Kanaan,PMP
Huawei HSS9860 stores and manages identities, authentication data, subscription information, and location information about subscribers. In addition, the HSS9860 verifies mobile terminals when mobile terminals attempt to connect to networks.
The HSS9860 implements the following functions:
Home location register (HLR) in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) networks
Equipment identity register (EIR) in GSM, UMTS, and EPS networks.
Home subscriber server (HSS) in evolved packet system (EPS) networks
HSS, subscription locator function (SLF), E.164 number to URI mapping (ENUM), or domain name server(DNS) in IP multimedia subsystems (IMS).
GSM, UMTS, EPS, and IMS networks are 3GPP access networks while CDMA, WLAN, WiMax, and ADSL are non-3GPP access networks.
Lte training an introduction-to-lte-basicsSaurabh Verma
The document provides an overview of LTE (Long Term Evolution) technology. It discusses that LTE was standardized by 3GPP in 2008 to improve the performance and efficiency of wireless networks. Key aspects of LTE include the use of OFDMA for downlink and SC-FDMA for uplink, support for flexible bandwidths, and an evolved packet core network architecture. LTE aims to provide higher speeds, lower latency, and more efficient use of spectrum compared to previous 3G technologies.
The document discusses next generation networks (NGN) and IP Multimedia Subsystem (IMS). NGN aims to converge different access networks onto a single all-IP infrastructure to seamlessly deliver multimedia services. IMS is an architectural framework for delivering IP-based services to users on both fixed and mobile networks. It provides session control functions and enables real-time multimedia services like voice and video over packet networks.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
The document describes several registration and de-registration flows for IP Multimedia Subsystem (IMS). The key steps are:
1. For registration, the UE requests P-CSCF information from DHCP and DNS servers, then sends a register request to the P-CSCF which assigns a S-CSCF and retrieves the user profile from HSS.
2. Periodic re-registration follows the same process to refresh the registration.
3. For de-registration, the UE or network send a register request with expiration time of zero, removing the registration.
The document discusses key technologies in LTE including access techniques, MIMO, scheduling, link adaptation, and HARQ. It covers OFDM and SC-FDMA used for downlink and uplink access, benefits of MIMO including improved SINR and shared SINR through modes like transmit diversity, receive diversity, and spatial multiplexing. Scheduling considers factors like CQI and aims for fairness and throughput. Link adaptation uses CQI and MCS to optimize air interface efficiency. HARQ enables recovery of errors at the MAC layer through retransmissions.
This document discusses various types of call forwarding in 3 sentences:
It describes unconditional and conditional call forwarding scenarios as well as no reply, busy, and not reachable scenarios. The state transition models show the signaling flows between network elements like the GMSC, HLR, MSC, and VLR when a call is forwarded due to various conditions like absent subscriber, no reply, radio congestion, or detachment. Registration, erasure, activation, and deactivation functions are also covered with regard to managing call forwarding numbers and services.
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
The document discusses the framing structure of SDH and various alarms that can occur in SDH networks. It explains the hierarchy from STM-1 frame down to VC-4 and tributary unit levels. It then describes alarms like LOS, LOF, LOP that can happen at different levels due to issues like signal loss, missing frames, or lost pointers. It also covers alarms for indicating defects or errors like AIS, RDI, REI, BIP and methods for error monitoring using bytes in the SDH frame.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
This document describes basic concepts related to routing calls in a telecommunications network, including call source, route selection source name (RSSN), route selection name (RSN), and their relationships. It discusses how different call sources with different RSSNs can be routed to different routes despite having the same call prefix. It also provides an example of how call blocking from a particular call source is implemented and how transit calls between public land mobile networks can be blocked.
The document describes the Cisco SPA 303 3-Line IP Phone. It has 3 lines, a LCD screen, speakerphone, and connects directly to an IP PBX or internet telephone service. It supports SIP and SPCP protocols and has features like caller ID, conferencing, provisioning and security. It is designed for businesses and home offices to make and receive calls over an IP network.
Introduction to Programmable Networks by Clarence Anslem, IntelMyNOG
This document discusses programmable networks and introduces key concepts:
- Programmable networks allow for innovation by enabling the writing of packet processing algorithms rather than relying on fixed-function hardware. This is done through programmable switches and protocol-independent packet processors.
- P4 is a language that allows defining packet parsing, headers, tables, and processing logic in a target-independent way. It enables protocol and target independence.
- Programmable switches implement the PISA model with a parser, match-action tables, and deparser. They can be programmed through a P4 program that is compiled for the target hardware.
- Example applications discussed are in-band network telemetry and 5G
Here are some useful GDB commands for debugging:
- break <function> - Set a breakpoint at a function
- break <file:line> - Set a breakpoint at a line in a file
- run - Start program execution
- next/n - Step over to next line, stepping over function calls
- step/s - Step into function calls
- finish - Step out of current function
- print/p <variable> - Print value of a variable
- backtrace/bt - Print the call stack
- info breakpoints/ib - List breakpoints
- delete <breakpoint#> - Delete a breakpoint
- layout src - Switch layout to source code view
- layout asm - Switch layout
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some ...
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
This document provides an overview of traditional telephone network signaling protocols and voice over IP protocols. It discusses SS7 and its components for traditional PSTN signaling, as well as peer-to-peer and client-server protocol architectures. Specific protocols covered include H.323, SIP, MGCP, and SCCP. Network design considerations for VoIP are also mentioned.
GMNS will design and implement a computer network for First Bourne Tax Services including installing hardware such as servers, switches, routers, firewalls, and access points. The network will utilize virtualization and cloud services including containers for functions like DHCP, DNS, file sharing, and security cameras. Hardware specifications are provided for the EMC storage servers and considerations for storage configuration, RAID levels, and calculating disk IOPS.
This document discusses segment routing and its benefits for incremental deployment in networks. It describes how segment routing uses MPLS or IPv6 routing headers to encode paths as ordered lists of segments. Segment routing allows more control over traffic paths compared to traditional IGP routing. It can enable traffic engineering and service chaining while maintaining network and control plane simplicity. The document argues segment routing is useful for scaling datacenters and simplifying peering relationships.
The document provides an overview of Software Defined Networking (SDN). It discusses the history and disadvantages of traditional networking approaches. It then defines SDN, describing its architecture and key components like the data plane, control plane, and management plane. It outlines the needs and benefits of SDN, such as virtualization, orchestration, programmability, and automation. It also covers SDN concepts like the OpenFlow protocol and SDN controllers.
The document provides an overview of managing the configuration of a Tactical Data Network Gateway (TDN GW) system. It discusses the configuration of key components including a Dell laptop, Lantronix serial device server, and software versions running on various nodes. The purpose is to introduce operators to management of the TDN GW to provide reliable secure networking to deployed users.
Sunil Gupta is a Network Engineer with over 5 years of experience. He is currently working at IBM India Pvt. Ltd. as a Network Engineer supporting Adani Group's Network Operations Centre. He has experience working with Cisco routers, switches, firewalls, and other networking equipment. His skills include routing protocols, VLAN configuration, firewall configuration, and network troubleshooting. He holds a BTech in Electronics and Communication and has completed training in CCNA Routing and Switching.
This document discusses techniques for offloading I/O transactions from the CPU to improve performance. It introduces iDMA which allows direct communication between I/O devices and system memory without CPU involvement. It also describes the "Hot Potato" approach which treats payload data as a "hot potato" passed directly between devices without CPU processing. Finally, it proposes "Device2Device" (D2D) communication which allows direct transfer of data between I/O devices like sending video data directly from a SSD to a NIC without using system memory or the CPU. Measurements show these approaches can significantly reduce latency and improve throughput and power efficiency compared to traditional CPU-managed I/O.
The document provides instructions for setting up and using a wireless customer premises router (CPE). It includes:
1) An overview of the CPE and its capabilities, including routing traffic between a user network and internet service provider.
2) Details on proper network implementation, including using the CPE as a router between wired and wireless networks with different IP ranges.
3) Instructions for accessing and navigating the CPE's browser-based user interface to configure settings like IP addresses, default gateways, and wireless settings.
4) Step-by-step directions for basic CPE configuration options, including setting the CPE up as a router with network address translation between its Ethernet and wireless interfaces.
Banog meetup August 30th, network device property as codeDamien Garros
Managing Network Device Properties as Code:
Device configuration templates have simplified a lot of things for the network industry but most people are still managing their device properties (aka variables) manually which is very tedious and error prone. This talk will present a new approach to generate and manage network device properties easily using infrastructure as code principles.
LTE network planning involves coverage and capacity planning. Key aspects of LTE network planning include link budget and capacity estimation. Radio network planning solutions help with interference avoidance, co-antenna analysis, and other performance enhancement features. LTE has a flat network architecture with OFDM technology and MIMO. Network elements include eNodeBs and elements in the EPC such as MME, S-GW, and P-GW.
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
This chapter discusses point-to-point connections and configuring PPP. It covers serial point-to-point communication fundamentals including HDLC encapsulation. PPP operation is explained, including how LCP and NCP establish and manage connections. The document provides instructions for configuring PPP encapsulation, options like authentication, compression, and multilink. It also includes commands for verifying PPP configuration and troubleshooting connectivity issues.
The document proposes an architecture for establishing a distributed IP-PBX communication system using multiple voice registers on different platforms and integrating both packet-switched and circuit-switched networks. It provides background on telecommunication technologies and protocols as well as an example case study of implementing the proposed architecture for a nationwide organization with distributed regional offices connected over an IP network. The case study demonstrates configuration of an Asterisk server and Cisco routers to enable voice communication between the regional branches using both the IP network and public switched telephone network.
The document discusses intelligent networks and their operation. It introduces intelligent network components like the service control point (SCP) and service switching point (SSP). It describes how intelligent network services are registered and originated, going through authentication, announcement, and call routing procedures. It also addresses related standards, performance evaluation methods, and technical issues regarding security, evolution to IP networks, and cost effectiveness.
Similar to ZTE FL NGN ZXSS10 Induction training manual.pdf (20)
ARENA - Young adults in the workplace (Knight Moves).pdfKnight Moves
Presentations of Bavo Raeymaekers (Project lead youth unemployment at the City of Antwerp), Suzan Martens (Service designer at Knight Moves) and Adriaan De Keersmaeker (Community manager at Talk to C)
during the 'Arena • Young adults in the workplace' conference hosted by Knight Moves.
Revolutionizing the Digital Landscape: Web Development Companies in Indiaamrsoftec1
Discover unparalleled creativity and technical prowess with India's leading web development companies. From custom solutions to e-commerce platforms, harness the expertise of skilled developers at competitive prices. Transform your digital presence, enhance the user experience, and propel your business to new heights with innovative solutions tailored to your needs, all from the heart of India's tech industry.
Explore the essential graphic design tools and software that can elevate your creative projects. Discover industry favorites and innovative solutions for stunning design results.
Visual Style and Aesthetics: Basics of Visual Design
Visual Design for Enterprise Applications
Range of Visual Styles.
Mobile Interfaces:
Challenges and Opportunities of Mobile Design
Approach to Mobile Design
Patterns
Fonts play a crucial role in both User Interface (UI) and User Experience (UX) design. They affect readability, accessibility, aesthetics, and overall user perception.
Technoblade The Legacy of a Minecraft Legend.Techno Merch
Technoblade, born Alex on June 1, 1999, was a legendary Minecraft YouTuber known for his sharp wit and exceptional PvP skills. Starting his channel in 2013, he gained nearly 11 million subscribers. His private battle with metastatic sarcoma ended in June 2022, but his enduring legacy continues to inspire millions.
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEFebless Hernane
CapCut is an easy-to-use video editing app perfect for beginners. To start, download and open CapCut on your phone. Tap "New Project" and select the videos or photos you want to edit. You can trim clips by dragging the edges, add text by tapping "Text," and include music by selecting "Audio." Enhance your video with filters and effects from the "Effects" menu. When you're happy with your video, tap the export button to save and share it. CapCut makes video editing simple and fun for everyone!
3. Morning class
08:30-12:30 A.M
Afternoon class
13:30-17:00 P.M
Coffee Break:
Morning: 10:30 AM - 10:45 AM
Afternoon: 3:00 PM - 3:15 PM
TRAINING TIME-BUDGET
Training Duration: 03 days
4. Describe NGN working principle
Describe NGN protocols
Describe H.248 call flow scenarios
Know Subscriber Configuration steps
Understand the Subscriber Number Allocation( Hundred group and
zone concepts)
Know the DAS Configuration
OBJECTIVE OF THE TRAINING
5. Top-down content presentation
Conceptual briefings on milestone areas
Illustrative diagrams
Demonstrative simulations if any
White board drawings if necessary
Interaction (Q&A)
o A sound, friendly & conducive learning environment setup
Site visit for real equipment view
Closing remarks
TRAINING METHODOLOGY
6. Put Cell phones in Silent mode or
No side talk
Punctuality (e.g. mornings & after coffee break)
Politeness/Courtesy
Concentration/Focus
Enthusiasm/Passion
Sharing know how
…
GROUND RULES FOR TRAINING SUCCESS
(LEARNING CLIMAX)
7. CH-1: Introduction to NGN
CH-2: H.248 protocol stack
CH-3: H.248 subscriber configuration and service problem
troubleshooting
Dashboard | October 27, 2014
P_007
PRESENTATION RUNNING ORDER
9. NGN STANDARD ARCHITECTURE
9
Service APPS
Control Softswitch
Core
Access
TG AG BGW
Intelligent
terminals
OA
M
Supporting
platform
SG
NMS
Billing
Softswitch
IP Network
PSTN/P
HS
Broadband
Access
Other
NGN
IAD
IPPhone
IP VT
HLR
BAC-
N
11. ZTE NGN ARCHITECTURE
11
Access
ZXSS10
IAD series
Broadband
Access
Core
Control
Service
ZXMSG
5200
ZXMSG7200
ZXMSG9000
ZXSS10 SS1 ZXSS10 SS1
ZXUP10 APP Router Server
IAD Manager ZXSS10
NMS
Core Packet Network
PSTN
/ISDN
SS7
Network
PBX
Private
Network
ZXSS10
BGW
Soft-
Phone
SHLR
Video
phone
12. SS:SoftSwitch-- core of NGN network.
Call control processing
Protocol Adaptation
Service Interface Provisioning
Application System Support
SG:Signaling Gateway
Accomplishing signaling translation from PSTN to
IP
TG:Trunk Gateway
Accomplishing voice translation from PSTN to IP
ELEMENT OF NGN
12
13. MSAG:Multi-Service Access Gateway
Accessing subscribers
IAD:Integrated Access Gateway
Accessing subscribers
BGW:Broadband Gateway
Inter-connect public network and private network
SHLR: Smart Home Location Register
Storing subscribers data
Application Server
Provide API (Application Programming Interface)
for different service
ELEMENT OF NGN
13
14. Call control
protocol
Transportation
control protocol
Media control
protocol
Service
application
protocol
• ISUP, TUP over
IP;
• Q.931;
• BICC;
• SIP-T;
• H.323
• TCP, UDP;
• SCTP;
• TCAP/SCCP/M
3UA
• H.248;
• SIP;
• MGCP
• INAP(CS2);
LDAP; RADIUS
• OAM protocol
• SNMP
• LAN protocol
• IEEE802.3,
IEEE 802.3u;
TCP/IP protocol
suite
ZXSS10 SS1B PROTOCOL SUPPORT CAPABILITY
22. BOARD FUNCTION DESCRIPTION
■ SSC: SYSTEM CONTRL CARD (CPU 800/7410)
■ ESC: An enhanced version of SSC, Enhanced SSC (ESC)
is designed to improve the overall processing capability of
ZXSS10 SS1b
■ SSN: SYSTEM SWITCHING NETWOTK
■ SPC: SYSTEM PROTOCOL CARD
■ ESPC: an enhanced version of SPC
■ NIC: NETWORK INTERFACE CARD
■ SSNI: SYSTEM SWITCHING NETWORK INTERFACE
■ TIC: TRANSPORTATION INTERFACE CARD
23. SSC Board: Control and Monitor
■ Hardware
• CPU(MPC7410, MPC750), RAM
• IDE,
• Ethernet Interface,
• Power supply,
• Serial bus(RS-485/RS- 232)
• Board status: online/offline/reset
■ Function
• Monitor the hardware and software status of other boards.
• Control other board in the shelf.
• File backup (Software version, CLI script, etc. )
• SC active-reserve switch.
24. ESC: An enhanced version of SSC
■ Has powerful processing capability and large-size memory; It shares
part of protocol processing tasks.
■ Provides external interfaces that are necessary for the system.
■ Monitors and controls the working status of other boards within the
system; Provides a hot plugging function.
■ Provides ports for communication with two SSNs.
■ Provides active/standby control and communication signals;
■ Provides interfaces and status signals relating to power detection, and
provides information about slot numbers and shelf numbers.
25. SSN board: Ethernet switching network
■ Hardware
• CPU, RAM, Switching Chip
• 24 100M Ethernet interface.
• 13 for SPCs
• 2 for SCs
• 6 for NICs
• others for DB server, shelf cascade.
■ Function
• Provide Ethernet switching platform
26. NIC Network Interface Card
■ Hardware
• CPU, RAM
• 2 Ethernet Interface 1 for inner Ethernet network, 1 for
• outer IP network
■ Function
• Distribute the Protocol and other packet among SPCs.
27. SPC: System Protocol Card
■ Hardware
• CPU, RAM
• 1 10Base-T Ethernet Interface
■ Function
• Protocol and Call processing.
28. ESPC: As an enhanced version of SPC
■ Has powerful processing performance and large-size
memory; Shares part of protocol processing tasks.
■ Provides ports for communication with other boards.
■ Provides SC-controlled auxiliary communication channels.
30. SS1B shelf cascading
■ CSN board
• Inserted in Slot 7 and Slot 8 of the main shelf
• Provide 24*FE + 4 *GE, layer-2 Ethernet switching
• Work in the active/standby mode
■ CSNI board
• Provides Ethernet connection for CSN board
■ GNIC board
Provides 1 GE and 4 FE ports used to connect to the
external network
31. Master shelf Card Slot Position
J
REAR
i
L
r
C
S
N
I
G
N
I
C
G
N
I
C
N
I
C
N
I
C
T
I
C
S
S
N
I
CARD NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
k
FRONT
i
i
r
S
S
C
S
S
C
S
P
C
1
S
P
C
2
C
S
N
C
S
N
S
S
N
S
S
N
32.
33.
34. SPC Software Architecture
Database
Call & Service subsystem
Billing
/OAM
Vieun interface
Etc.
MGC
P
H248 H323 SIP SIP-T SS7
SIGT
RAN
DSS1
Support subsystem
Hardware
87. ADD Zone
ADD Node
Allocating Subscriber Number
Default Template Configuration
TID Name Configuration
DAS Configuration
CONTENTS
88. Node:Represent a Device
Zone:A set of gateway nodes with the same properties
CONCEPT
89. The nodes with different equipment types cannot
exist in the same gateway cluster. In the SS
system, SPC data area and hundred groups are
allocated in the unit of gateway cluster. Before
addition of IAD equipment, the gateway cluster
where this IAD equipment resides should be
configured.
Right Click SS Configure Management
IAD GATEWAY CLUSTER CONFIGURATION
92. The SPC of SS control equipment processes
calls & protocols based on the gateway cluster.
After a gateway cluster is added, we need to
allocate an SPC for it.
Right Click SS Configure Management
Globe Configuration SS Data Configuration
Shelf Configuration Right Click SPC Card
Data Area Capacity Configuration Click “Add”
CONFIGURATION OF DATA AREA CAPACITY
95. We must allocate services, protocols and authentication
of users in the zone (gateway cluster) to the SPC board
for processing.
ZONE TO CARD CONFIGURATION
96. Right Click SS and Select Command Line Terminal
REBOOT THE SPC CARD
102. Local Office User Configuration
1. Local Office Code
IAD USER CONFIGURATION
Click Add and Select Add Local Office Code
103. ADD Local Office Code
ADD Hundred Set
ADD LOCAL OFFICE CODE
Office Code:8426
Local Office Use…4
8426XXXX
104. Local Office User Configuration
User Configuration Local Office User Configuration
Click “Add”
IAD USER CONFIGURATION
105. Here we have to specify the default property template and packet
template ID for different terminal types.
Enter in to the Zone and Select Default Attribute Configuration
TID DEFAULT ATTRIBUTE CONFIGURATION
106. TID Name is the terminal ID in the H.248 protocol, used
for identifying the physical termination point (user circuit)
and the logic termination point (RTP Port).
CONFIGURATION OF THE TID NAME
107. Select “Add” then “Add TID Name”
CONFIGURATION OF THE TID NAME
User Circuit