Third Party Data Session Control in the Evolved Packet System

Size: px
Start display at page:

Download "Third Party Data Session Control in the Evolved Packet System"

Transcription

1 Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA [email protected] Abstract: - The paper studies implementation issues of third party application control on packet data sessions in the Evolved Packet System (EPS). The research is based on the standardized functional architecture for Policy and Charging Control. Open Service Access (OSA) application programming interfaces for Data Session Control are considered and their deployment in all Internet Protocol based networks is described. A formal approach to functional verification of OSA application server is presented. The approach may be used to generate automatic tests for verification of OSA gateway behavior. Key-Words: - Open Service Access, Policy and Charging Control, Finite State Machines, Formal functional verwitication 1. Introduction Evolved Packet System (EPS) is standardized by the Third Generation Partnership Project (3GPP) as evolution of all Internet Protocol based packet networks that allows evolution of any deployed wireless or wired access technology. EPS provides mechanisms for quality of service and policies to control and manage services and to differentiate charging [1], [2]. The standard supports delivery of combinations of multimedia telephony and internet services hosted by the network operator or third party service provider [3], [4]. Opening the network interfaces for third party stimulates service provisioning and promotes the convergence between IT applications and public telecommunication services [5], [6], [7]. Open Service Access (OSA) is a technology which illustrates the convergence of IT and telecommunications. OSA allows third party applications to invoke communication functions in a public network using application programming interfaces. Network functions accessed by applications are called Service Capability Features (SCF) [8]. Application programming interfaces (APIs) are defined for each OSA SCF exposed toward the applications. The OSA Data Session Control SCF allows setting up, releasing, and managing packet data sessions [9]. The 3GPP standards define OSA Data Session Control interfaces mapping in packet switched mobile intelligent networks [10]. Deployment of Data Session Control interfaces in EPS networks allows third party applications access to policy and charging functions and requires the respective interface to protocol mapping. Some publications concerning OSA SCF implementation, focus on aspects related to the APis, while other authors discuss evaluation of conformance of the session control mechanisms in the network out of the application context [11], [12], [13]. In this paper, some implementation issues of OSA Data Session Control APIs in EPS networks deploying dynamic policy and charging control are studied. In Section 2, functional architecture for third party control on packet data sessions is considered. Section 3 presents the suggested protocol view on the packet data session states and both state models as seen by the network and third party applications are formally described. In Section 4, an approach to formal verification of application server that supports Data Session Control interfaces and the policy and charging control protocol is presented. 2. Functional architecture for deployment of third party control on packet data sessions in EPS ISBN:

2 3GPP standards define Policy and Charging Control (PCC) architecture aimed to provide means for authorization and control the usage of bearer resources intended for packet data traffic [14]. The overall operator control on Quality of Service (QoS), source/destination of data traffic and the start and stop of the packet data traffic is based on policies and allows flow based charging. The functional architecture for third party control on packet data sessions in EPS networks is shown in Fig.1. The figure does not present all PCC functional entities but those that are related to the current research. PCRF Diameter Media gateway 3 rd party domain AS OSA interfaces Diameter AF OSA gateway Fig.1 Functional architecture for 3 rd party control on packet data sessions in PCC enabled networks The Policy and Charging Rule Function (PCRF) is responsible for making PCC decisions based on session and media related information obtained from the Application Function (AF). The PCRF generates charging rules and authorizes the bearer resources with the appropriate QoS for the packet flows. The AF extracts the session information from session related signaling during session establishment between two parties. The AF may provide initial session information not fully negotiated yet at an earlier stage in order to allow service authorization. The AF provides final session information based on negotiated session parameters between two parties. The AF may modify session information at any time (e.g. due to application requested increase of data rates). Depending on the application, in service information provision, the AF may instruct the PCRF when the packet flows are to be enabled or disabled to pass through the access network and thus providing gating control. When the packet data session is terminated (e.g. due to the application request), the AF report this to the PCRF. The AF may subscribe to receive notifications about QoS events related to the packet data session. In case of available subscription, on occurrence of QoS events the PCRF notifies the AF. The signaling protocol used for PCC at the reference point between AF and PCRF is Diameter [14]. The AF may be Application Server (AS) that hosts application logic. To enable party control on packet data sessions, the network operator needs to deploy a special type of AS that is OSA gateway. The OSA gateway exposes OSA interfaces towards exterior of the network and control protocols toward the interior of the network. The OSA gateway needs to perform functional mapping between OSA interface methods and Diameter messages. 3. Data session state models The OSA gateway which supports Data Session Control interfaces toward the external applications and Diameter protocol towards the network needs to maintain two mutually synchronized models representing the data session states. The model representing the application view on data session states is defined in [9]. According to that model, the data session object can be in one of the following states. In Idle state, the data session object is not created. The Setup state is entered when the reportnotification method indicates that a data session, which the application is interested in, is setup. In Setup state, the application can request session establishment to the remote party by invoking connectreq method. In Established state, the application is notified that the session is established. In NetworkReleased state, the session is terminated and the application can gather session information. In ApplicationReleased state, the data session is terminated by the application. From data session control point of view, the Idle, Network released and Application released states are equivalent, as far as the data session is neither in establishing nor in active phase. 3GPP standards define the procedures at the reference point between the PCRF and the AF but do not provide a model that represents the AF view on packet data session in the context of PCC [15]. As ISBN:

3 mediation functionality between third party applications and PCC related functional entities, the OSA gateway needs also a model that represents the Diameter view on the packet data session states. This model has to reflect the states of the QoS resources authorized for the packet data session in order to provide the AF with means for QoS control and usage monitoring. The suggested model representing the states of QoS resources authorized for a packet data session is shown in Fig.2. AAR SE Idle AAR ISE RAR SS Authorize ServiceInfo AAR FSE Authorize SessionInfo AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC STR ST ASR ABR Fig. 2 Model representing the states of QoS resources authorized for a packet data session In Idle state, no QoS resources are authorized for the session. If the application receives notification about session setup signaled by Diameter command Re-Authorization Request (RAR SS ) the QoS resources state moves to. If the application receives notification about session establishment signaled by Diameter command the QoS resources state becomes. In Idle state, an application or service requiring dynamic PCC interacts with the AF which extracts session information from application signaling and provides this to the PCRF by sending a Diameter command for initial session establishment (AAR ISE ). This results in transition to state. It is possible for the AF to subscribe to QoS events by Diameter command Authentication-Authorization Request (AAR SE ). In state, the early authorization check of the service information is performed. When final session parameters are negotiated, the AF sends a Diameter command to the PCRF for final session information (AAR FSE ). This results in transition to state. In state, on behalf of application, the AF may request media component removal (AAR MCR ), provide gating control (AAR GC ), subscribe for QoS event notification (AAR SE ) and be notified about QoS events (RAR EN ). The AF may send initial session modification information (AAR ISM ) and final session modification information (AAR FSM ) to the PCRF in order to authorize the session modification. In state and state, if all bearers assigned to the session are lost, the PCRF requests the AF session abort by sending a Diameter command Abort Session Request (ASR ABR ). The AF also may initiate session termination by sending a Diameter Session Termination Request (STR ST ). These result in transition to Idle state. The formal specification of packet data session state models as Labeled Transition Systems allows usage of formal means to prove the synchronized behavior of both models in the OSA gateway. This may be used for automatic generation of test cases during the functional verification of OSA gateway. To prove behavioral equivalence between state machines formally, the notion of Labeled Transition Systems is used [16]. Definition 1: A Labeled Transition System (LTS) is a quadruple (S, Аct,, s 0 ), where S is a countable set of states, Act is a countable set of elementary actions, S Act S is a set of transitions, and s 0 S is a set of initial states. By T Diameter =(S Diameter, Act Diameter, Diameter, s 0 ) it is denoted an LTS which represents a simplified QoS resources state model reflecting the third party application view where: - S Diameter = {Idle,, }, - Act Diameter = {AAR ISE, AAR FSE, AAR ISM, AAR FSM, AAR MCR, AAR GC, AAR SE, RAR EN, RAR SS,, STR ST, ASR ABR }, - Diameter = {Idle AAR ISE, Idle, Idle RAR SS, AAR SE, AAR FSE,, STR ST Idle, ISBN:

4 ASR ABR Idle, AAR IMS, AAR FSM, AAR GC, AAR MCR, AAR SE, RAR EN, STR ST Idle, ASR ABR Idle}, - s 0 = {Idle}. By Т DSC = (S DSC, Аct DSC, DSC, s 0 ) it is denoted an LTS, representing the OSA application view on data session state where: - S DSC = {,, Established DSC }; - Act DSC = {datasessionsetup,, connectreq, release, datasessiondisconnected, datasessionsupervisionevent}, - DSC = { datasessionsetup, connectreq Established DSC, Established DSC, datasessiondisconnected, release, Established DSC datasessiondisconnected, Established DSC release Established DSC datasessionsupervisionevent Established DSC }; - s 0 = { }. Having the formal descriptions of data session state model and QoS resources state model by LTSs, we use the concept of weak bisimulation to prove that both LTSs expose equivalent behavior. 4. An approach to formal verification of functional behavior of OSA gateway The following notations are used: - s а s stands for the transition (s, a, s ); а - s means that s : s s ; µ - s s n, where µ = а 1, а 2,..., а n : s 1, s 2,, а 1 а n s n, such that s s 1... s n ; µ - s means that s, such as s s ; - µˆ µ means if μ τ or otherwise, where τ is one or more internal (invisible) actions. а µ The concept of bisimulation is used to prove that two LTSs expose equivalent behavior [16]. The strong bisimulation possesses strong conditions for equivalence which are not always required. For example, there may be internal activities that are not observable. The weak bisimulation ignores the internal transitions. Definition 2: Two Labeled Transition Systems T = (S, A,, s 0 ) and T = (S, A,, s 0 ) are weakly bisimilar if there is a binary relation U S S such that if s 1 U t 1 : s 1 S and t 1 S then a Act: a â - s 1 s 2 implies t 2 : t 1 t 2 and s 2 U t 2 ; a â - t 1 t 2 implies s 2 : s 1 s 2 and s 2 U t 2. In order to prove that both models as seen by a third party application and by the network running at the OSA gateway are synchronized, it has to be proved that both LTSs, that formally describe the models, expose equivalent behavior. The behavioral equivalence is proved using the concept of weak bisimilation. Proposition: The LTSs Т DSC and Т Diameter are weakly bisimilar. Proof: To prove the bisimulation relation between LTSs, it has to be proved that there is a bisimulation relation between their states. First, homomorphism between the Аct DSC and Act Diameter is identified in Table 1. Table 1 Homomorphism between Act DSC and Act Diameter Act DSC Act Diameter datasessionsetup AAR ISE, RAR SS connectreq AAR FSE, release STR ST datasessiondisconnected ASR ABR datasessionsupervisionevent AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC supervisedatasessionreq AAR SE By U it is denoted a relation between the states of Т DSC and Т Diameter where U = {(, Idle), (, ), (AuthorizeSession- Info, Established)}. Table 2 presents the bisimulation ISBN:

5 relation between the states of Т DSC and Т Diameter which satisfies the Definition 2. Based on the bisimulation relation between the states of Т DSC S and Т Diameter it can be concluded that Т DSC and Т Diameter expose equivalent behavior. Table 2 Bisimulation relation between T DSC and Т Diameter s 1 a â s 2 s 1, s 2 S DSC t 1 datasessionsetup Established DSC Established DSC datasessionsupervision- Event Established DSC Established DSC release Established DSC datasessiondisconnected release datasessiondisconnected Established DSC, Established DSC, t 2 t 1, t 2 S Diameter Idle AAR ISE AAR FSE AAR MCR, AAR GC, RAR EN, AAR ISM, AAR FSM STR ST Idle ASR ABR Idle STR ST Idle ASR ABR Idle Idle The detailed formal description of both models representing the packet data session states as view by the application and by the network, including behavior in case of errors makes possible to automate the process of generation of test sequences to verify the functional behavior of the OSA gateway. 5. Conclusion The deployment of third party control on packet data sessions in the EPS requires provisioning of open access to network functions related to policy and charging control. External applications access.the policy and charging functions using OSA Data Session Control interfaces instead of network control protocols. A key role in this context plays the OSA gateway which needs to perform interoperability functions mediating between applications and network entities. The suggested formal approach to functional verification of OSA gateway may facilitate its implementation and shorten the time to market for differentiated services. Acknowledgement: The research is in the frame of Project DDBY02/13/ funded by National Science Fund, Bulgarian Ministry of Youth, Education and Science. References: [1] J. Balbas,, S. Rommer, J. Stenfelt, Policy and charging control in the evolved packet system, IEEE Communications Magazine, 2009, vol.47, issue 2, pp [2] S. Quellette, L. Marchad, Pierre, Samuel, A potential evolution of the policy and charging control/qos architecture for the 3GPP IETFbased evolved packet core, IEEE Communications Magazine, 2011, vol.49, issue 5, pp [3] L. Baleh, L. Suciu, J. Bonnin, Enriched connectivity-as-a-service for dynamic Mobile- Cloud, Proc. of IEEE Consumer Communications and Networking Conference CCNC 2012, pp [4] R. Copeland, N. Crespi, Policies to Enable Serving Untrusted Services on Alternative (Non- 3GPP) and Untrusted Access Networks in EPS, Proc. of IEEE Computer Software and Applications Conference Workshops COMPSACW 2011, pp ISBN:

6 [5] B. Odadzic, M. Jankovic, Open service access (OSA) business models and service level agreement aspects, Proc. of IEEE International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service TELSIKS 2003, vol.1, pp [6] J. Yang, H. Park, A Design of Open Service Access Gateway for Converged Web Service, Proc. of International Conference on Advanced Communication Technology, ICACT 2008, pp [7] M. Adeyeye, Future directions of converged services in the Web session mobility scenarios, Proc. of International Conference AFRICON 2011, pp.1-5. [8] H. Hanrahan, Network Convergence, Services, Applications, Transport and Operations Support, Wiley, [9] 3GPP TS Open Service Access (OSA); Application Programming Interface (API) Part 8: Data Session Call Control Service Capability Feature; Release 9, 2009, v [10] 3GPP TR Open Service Access (OSA); Mapping for Open Service Access; Part 4, Call Control Service Mapping; Subpart 2: API to CAP mapping, Release 9, 2009, v [11] I. Chlamtac, H. Lee, Y Lin, M Tsai, An OSA service capability server for mobile services, International Journal of Pervasive Computing and Communications, 2008, vol. 4, issue 3, pp [12] T.Magedanz, D. Witaszek, K. Knüttel, Service Delivery Platform Options for Next Generation Networks, approved within the national German 3G Beyond Testbed, 2004, Retrieved from 04/Plenary/Magedanz.pdf [13] S. Walker, Providing IMS Services to Legacy Network Endpoints, 2009, Retrieved from st_corner.pdf. [14] 3GPP TS Policy and charging control architecture, Release 12, v12.0.0, [15] 3GPP TS Policy and Charging Control signaling flows and Quality of S ervice (QoS) parameter mapping, Release 11, v11.6.0, [16] P. Panangaden, Notes on Labeled Transition Systems and Bisimulation, 2009, Retrieved from 330/Notes/lts09.pdf. ISBN:

Open Access to Call and Session Control in Mobile Networks

Open Access to Call and Session Control in Mobile Networks BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 10, No 1 Sofia 2010 Open Access to Call and Session Control in Mobile Networks Evelina Pencheva, Ivaylo Atanasov Technical

More information

Service Broker Function in IMS Architecture - Issues and Considerations

Service Broker Function in IMS Architecture - Issues and Considerations 12th WSE International Conference on COMPUTERS, Heraklion, Greece, July 23-25, 2008 Function in IMS Architecture - Issues and Considerations HUI-NA CHUA, CHOR-MIN TAN Malaysian Research Centre, British

More information

II. Service deployment

II. Service deployment BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Integration of Services Implemented on Different Service Platforms Evelina Pencheva, Ivaylo Atanasov Technical

More information

Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements. T. Grgic* and M.

Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements. T. Grgic* and M. Int. J. Intelligent Information and Database Systems, Vol. X, No. Y, xxxx 1 Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements T. Grgic* and M.

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:[email protected] Mr.Ketan

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros

More information

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile

More information

Advanced SIP Series: SIP and 3GPP

Advanced SIP Series: SIP and 3GPP Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia

More information

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:

More information

Security considerations for IMS access independence

Security considerations for IMS access independence 3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless

More information

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main

More information

Interaction between an Online Charging System and a Policy Server

Interaction between an Online Charging System and a Policy Server Interaction between an Online Charging System and a Policy Server Marc Cheboldaeff Carrier Applications EMEA Alcatel-Lucent Ratingen, Germany [email protected] Abstract According to the

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Adaptive Load Control of Service Oriented Architecture Server

Adaptive Load Control of Service Oriented Architecture Server Adaptive Load Control of Service Oriented Architecture Server I. Atanasov Key Words: Service Oriented Architecture; application server; admission control; load balancing. Abstract: This paper presents

More information

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com 1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

A Proposed Model For QoS guarantee In IMSbased Video Conference services

A Proposed Model For QoS guarantee In IMSbased Video Conference services International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical

More information

Solution Architecture

Solution Architecture CHAPTER 1 The Cisco Multiservice Packet Network Solution The Cisco Multiservice Packet Network Solution defines a multiservice point of presence (POP) architecture that allows Public Telephone and Telegraph

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

A Call Conference Room Interception Attack and its Detection

A Call Conference Room Interception Attack and its Detection A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,

More information

MDM and Telco Service Development OMA Device Management and Platforms

MDM and Telco Service Development OMA Device Management and Platforms MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview

More information

Mobility Management for All-IP Core Network

Mobility Management for All-IP Core Network Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

Service Continuity Path to smooth user experiences

Service Continuity Path to smooth user experiences Path to smooth user experiences Qualcomm Incorporated June 2010 Table of Contents [1] Introduction... 2 [2] Architecture... 3 [3] Use case... 4 [4] Conclusion... 6 06/2010 Page i [1] Introduction Qualcomm

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

CS Fallback Function for Combined LTE and 3G Circuit Switched Services EPC Voice over Circuit Switched Services Special Articles on SAE Standardization Technology CS Fallback Function for Combined and Circuit Switched Services The PP, an international standardization body

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

How To Manage A Virtualization Server

How To Manage A Virtualization Server Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires

More information

Architectural Overview of IP Multimedia Subsystem -IMS

Architectural Overview of IP Multimedia Subsystem -IMS Architectural Overview of IP Multimedia Subsystem -IMS Presented by: Masood Khosroshahy June 2006 B E G I N N I N G 1 Project supervisor: Prof. Elie Najm Simplified view of the layered architecture in

More information

Building Robust Signaling Networks

Building Robust Signaling Networks ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept

More information

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i - Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

Service Delivery Platforms for Network Operators

Service Delivery Platforms for Network Operators Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing

More information

230612 - AMC - Advanced Mobile Communications

230612 - AMC - Advanced Mobile Communications Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions

Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)

More information

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April

More information

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C * VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services

More information

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:

More information

ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification

ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

Internet Communications Using SIP

Internet Communications Using SIP Internet Communications Using SIP Delivering VolP and Multimedia Services with Session Initiation Protocol Second Edition Henry Sinnreich Alan B. Johnston WILEY Wiley Publishing, Inc. Contents Foreword

More information

Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services

Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services Sunhwan Lim and Hyunjoo Bae Future Communications Research Laboratory, ETRI, Daejeon, Korea

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Mobile Application Part protocol implementation in OPNET

Mobile Application Part protocol implementation in OPNET Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX [email protected] Steven Dennett Personal Communications Sector Motorola

More information

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

MS Series: VolP Deployment Guide

MS Series: VolP Deployment Guide Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using

More information

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE Voice over LTE SUBSCRIBER TECHNOLOGY White Paper Mobile operators have invested a lot of time and money in Intelligent Network (IN) services for

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document

More information

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16

More information

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan

More information

4G Mobile Networks At Risk

4G Mobile Networks At Risk 07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis

More information

Cisco Satellite Services Platform Delivering Managed Services over Satellite

Cisco Satellite Services Platform Delivering Managed Services over Satellite Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service

More information

Paving the Way to Next Generation Media and Signaling VoIP Gateways

Paving the Way to Next Generation Media and Signaling VoIP Gateways Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving

More information

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks BROADBAND UKRAINE: 12th June 2013, Kiev, Ukraine FOKUS Center for Next Generation Network Infrastructures (NGNI) Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

ETSI TS 101 329-2 V1.1.1 (2000-07)

ETSI TS 101 329-2 V1.1.1 (2000-07) TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all

More information

Multimedia Service Platform

Multimedia Service Platform Multimedia Service Platform Turnkey solution for SIP based communications Adrian Georgescu AG Projects http://ag-projects.com Current telecommunications landscape From the old PSTN only the E.164 numbering

More information

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated 3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543

More information

Lecture 4b AAA protocols (Authentication Authorization Accounting)

Lecture 4b AAA protocols (Authentication Authorization Accounting) Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture

More information

OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection. Scenarios

OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection. Scenarios OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection Scenarios Edlic Yiu, Edwood Yiu, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail:

More information

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum [email protected]

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum mccrum.william@ic.gc.ca Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 [email protected] Content Network Evolution and drivers VoIP Realizations

More information

FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE

FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE FROM TELEPHONY TO COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH COMMUNICATIONS APPLICATION NOTE CONTENTS INTRODUCTION / 3 INCREASE PRODUCTIVITY WITH A CONNECTED WORKSTATION

More information

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology

More information

The Ubiquitous Web, UPnP and Smart Homes

The Ubiquitous Web, UPnP and Smart Homes The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

LTE CDMA Interworking

LTE CDMA Interworking LTE CDMA Interworking ehrpd - Use of a Common Core and a Stepping Stone to LTE Mike Dolan Consulting Member of Technical Staff Alcatel-Lucent Overview ehrpd (evolved High Rate Packet Data*) ehrpd involves

More information

Load Balancing Support for Self-Organizing IMS Networks

Load Balancing Support for Self-Organizing IMS Networks Load Balancing Support for Self-Organizing IMS Networks Christian Makaya, Ashutosh Dutta, Subir Das, Dana Chee, F. Joe Lin Telcordia Technologies, Inc. Piscataway, NJ, USA Email: [email protected]

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information