Third Party Data Session Control in the Evolved Packet System
|
|
|
- May Hodge
- 10 years ago
- Views:
Transcription
1 Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA [email protected] Abstract: - The paper studies implementation issues of third party application control on packet data sessions in the Evolved Packet System (EPS). The research is based on the standardized functional architecture for Policy and Charging Control. Open Service Access (OSA) application programming interfaces for Data Session Control are considered and their deployment in all Internet Protocol based networks is described. A formal approach to functional verification of OSA application server is presented. The approach may be used to generate automatic tests for verification of OSA gateway behavior. Key-Words: - Open Service Access, Policy and Charging Control, Finite State Machines, Formal functional verwitication 1. Introduction Evolved Packet System (EPS) is standardized by the Third Generation Partnership Project (3GPP) as evolution of all Internet Protocol based packet networks that allows evolution of any deployed wireless or wired access technology. EPS provides mechanisms for quality of service and policies to control and manage services and to differentiate charging [1], [2]. The standard supports delivery of combinations of multimedia telephony and internet services hosted by the network operator or third party service provider [3], [4]. Opening the network interfaces for third party stimulates service provisioning and promotes the convergence between IT applications and public telecommunication services [5], [6], [7]. Open Service Access (OSA) is a technology which illustrates the convergence of IT and telecommunications. OSA allows third party applications to invoke communication functions in a public network using application programming interfaces. Network functions accessed by applications are called Service Capability Features (SCF) [8]. Application programming interfaces (APIs) are defined for each OSA SCF exposed toward the applications. The OSA Data Session Control SCF allows setting up, releasing, and managing packet data sessions [9]. The 3GPP standards define OSA Data Session Control interfaces mapping in packet switched mobile intelligent networks [10]. Deployment of Data Session Control interfaces in EPS networks allows third party applications access to policy and charging functions and requires the respective interface to protocol mapping. Some publications concerning OSA SCF implementation, focus on aspects related to the APis, while other authors discuss evaluation of conformance of the session control mechanisms in the network out of the application context [11], [12], [13]. In this paper, some implementation issues of OSA Data Session Control APIs in EPS networks deploying dynamic policy and charging control are studied. In Section 2, functional architecture for third party control on packet data sessions is considered. Section 3 presents the suggested protocol view on the packet data session states and both state models as seen by the network and third party applications are formally described. In Section 4, an approach to formal verification of application server that supports Data Session Control interfaces and the policy and charging control protocol is presented. 2. Functional architecture for deployment of third party control on packet data sessions in EPS ISBN:
2 3GPP standards define Policy and Charging Control (PCC) architecture aimed to provide means for authorization and control the usage of bearer resources intended for packet data traffic [14]. The overall operator control on Quality of Service (QoS), source/destination of data traffic and the start and stop of the packet data traffic is based on policies and allows flow based charging. The functional architecture for third party control on packet data sessions in EPS networks is shown in Fig.1. The figure does not present all PCC functional entities but those that are related to the current research. PCRF Diameter Media gateway 3 rd party domain AS OSA interfaces Diameter AF OSA gateway Fig.1 Functional architecture for 3 rd party control on packet data sessions in PCC enabled networks The Policy and Charging Rule Function (PCRF) is responsible for making PCC decisions based on session and media related information obtained from the Application Function (AF). The PCRF generates charging rules and authorizes the bearer resources with the appropriate QoS for the packet flows. The AF extracts the session information from session related signaling during session establishment between two parties. The AF may provide initial session information not fully negotiated yet at an earlier stage in order to allow service authorization. The AF provides final session information based on negotiated session parameters between two parties. The AF may modify session information at any time (e.g. due to application requested increase of data rates). Depending on the application, in service information provision, the AF may instruct the PCRF when the packet flows are to be enabled or disabled to pass through the access network and thus providing gating control. When the packet data session is terminated (e.g. due to the application request), the AF report this to the PCRF. The AF may subscribe to receive notifications about QoS events related to the packet data session. In case of available subscription, on occurrence of QoS events the PCRF notifies the AF. The signaling protocol used for PCC at the reference point between AF and PCRF is Diameter [14]. The AF may be Application Server (AS) that hosts application logic. To enable party control on packet data sessions, the network operator needs to deploy a special type of AS that is OSA gateway. The OSA gateway exposes OSA interfaces towards exterior of the network and control protocols toward the interior of the network. The OSA gateway needs to perform functional mapping between OSA interface methods and Diameter messages. 3. Data session state models The OSA gateway which supports Data Session Control interfaces toward the external applications and Diameter protocol towards the network needs to maintain two mutually synchronized models representing the data session states. The model representing the application view on data session states is defined in [9]. According to that model, the data session object can be in one of the following states. In Idle state, the data session object is not created. The Setup state is entered when the reportnotification method indicates that a data session, which the application is interested in, is setup. In Setup state, the application can request session establishment to the remote party by invoking connectreq method. In Established state, the application is notified that the session is established. In NetworkReleased state, the session is terminated and the application can gather session information. In ApplicationReleased state, the data session is terminated by the application. From data session control point of view, the Idle, Network released and Application released states are equivalent, as far as the data session is neither in establishing nor in active phase. 3GPP standards define the procedures at the reference point between the PCRF and the AF but do not provide a model that represents the AF view on packet data session in the context of PCC [15]. As ISBN:
3 mediation functionality between third party applications and PCC related functional entities, the OSA gateway needs also a model that represents the Diameter view on the packet data session states. This model has to reflect the states of the QoS resources authorized for the packet data session in order to provide the AF with means for QoS control and usage monitoring. The suggested model representing the states of QoS resources authorized for a packet data session is shown in Fig.2. AAR SE Idle AAR ISE RAR SS Authorize ServiceInfo AAR FSE Authorize SessionInfo AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC STR ST ASR ABR Fig. 2 Model representing the states of QoS resources authorized for a packet data session In Idle state, no QoS resources are authorized for the session. If the application receives notification about session setup signaled by Diameter command Re-Authorization Request (RAR SS ) the QoS resources state moves to. If the application receives notification about session establishment signaled by Diameter command the QoS resources state becomes. In Idle state, an application or service requiring dynamic PCC interacts with the AF which extracts session information from application signaling and provides this to the PCRF by sending a Diameter command for initial session establishment (AAR ISE ). This results in transition to state. It is possible for the AF to subscribe to QoS events by Diameter command Authentication-Authorization Request (AAR SE ). In state, the early authorization check of the service information is performed. When final session parameters are negotiated, the AF sends a Diameter command to the PCRF for final session information (AAR FSE ). This results in transition to state. In state, on behalf of application, the AF may request media component removal (AAR MCR ), provide gating control (AAR GC ), subscribe for QoS event notification (AAR SE ) and be notified about QoS events (RAR EN ). The AF may send initial session modification information (AAR ISM ) and final session modification information (AAR FSM ) to the PCRF in order to authorize the session modification. In state and state, if all bearers assigned to the session are lost, the PCRF requests the AF session abort by sending a Diameter command Abort Session Request (ASR ABR ). The AF also may initiate session termination by sending a Diameter Session Termination Request (STR ST ). These result in transition to Idle state. The formal specification of packet data session state models as Labeled Transition Systems allows usage of formal means to prove the synchronized behavior of both models in the OSA gateway. This may be used for automatic generation of test cases during the functional verification of OSA gateway. To prove behavioral equivalence between state machines formally, the notion of Labeled Transition Systems is used [16]. Definition 1: A Labeled Transition System (LTS) is a quadruple (S, Аct,, s 0 ), where S is a countable set of states, Act is a countable set of elementary actions, S Act S is a set of transitions, and s 0 S is a set of initial states. By T Diameter =(S Diameter, Act Diameter, Diameter, s 0 ) it is denoted an LTS which represents a simplified QoS resources state model reflecting the third party application view where: - S Diameter = {Idle,, }, - Act Diameter = {AAR ISE, AAR FSE, AAR ISM, AAR FSM, AAR MCR, AAR GC, AAR SE, RAR EN, RAR SS,, STR ST, ASR ABR }, - Diameter = {Idle AAR ISE, Idle, Idle RAR SS, AAR SE, AAR FSE,, STR ST Idle, ISBN:
4 ASR ABR Idle, AAR IMS, AAR FSM, AAR GC, AAR MCR, AAR SE, RAR EN, STR ST Idle, ASR ABR Idle}, - s 0 = {Idle}. By Т DSC = (S DSC, Аct DSC, DSC, s 0 ) it is denoted an LTS, representing the OSA application view on data session state where: - S DSC = {,, Established DSC }; - Act DSC = {datasessionsetup,, connectreq, release, datasessiondisconnected, datasessionsupervisionevent}, - DSC = { datasessionsetup, connectreq Established DSC, Established DSC, datasessiondisconnected, release, Established DSC datasessiondisconnected, Established DSC release Established DSC datasessionsupervisionevent Established DSC }; - s 0 = { }. Having the formal descriptions of data session state model and QoS resources state model by LTSs, we use the concept of weak bisimulation to prove that both LTSs expose equivalent behavior. 4. An approach to formal verification of functional behavior of OSA gateway The following notations are used: - s а s stands for the transition (s, a, s ); а - s means that s : s s ; µ - s s n, where µ = а 1, а 2,..., а n : s 1, s 2,, а 1 а n s n, such that s s 1... s n ; µ - s means that s, such as s s ; - µˆ µ means if μ τ or otherwise, where τ is one or more internal (invisible) actions. а µ The concept of bisimulation is used to prove that two LTSs expose equivalent behavior [16]. The strong bisimulation possesses strong conditions for equivalence which are not always required. For example, there may be internal activities that are not observable. The weak bisimulation ignores the internal transitions. Definition 2: Two Labeled Transition Systems T = (S, A,, s 0 ) and T = (S, A,, s 0 ) are weakly bisimilar if there is a binary relation U S S such that if s 1 U t 1 : s 1 S and t 1 S then a Act: a â - s 1 s 2 implies t 2 : t 1 t 2 and s 2 U t 2 ; a â - t 1 t 2 implies s 2 : s 1 s 2 and s 2 U t 2. In order to prove that both models as seen by a third party application and by the network running at the OSA gateway are synchronized, it has to be proved that both LTSs, that formally describe the models, expose equivalent behavior. The behavioral equivalence is proved using the concept of weak bisimilation. Proposition: The LTSs Т DSC and Т Diameter are weakly bisimilar. Proof: To prove the bisimulation relation between LTSs, it has to be proved that there is a bisimulation relation between their states. First, homomorphism between the Аct DSC and Act Diameter is identified in Table 1. Table 1 Homomorphism between Act DSC and Act Diameter Act DSC Act Diameter datasessionsetup AAR ISE, RAR SS connectreq AAR FSE, release STR ST datasessiondisconnected ASR ABR datasessionsupervisionevent AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC supervisedatasessionreq AAR SE By U it is denoted a relation between the states of Т DSC and Т Diameter where U = {(, Idle), (, ), (AuthorizeSession- Info, Established)}. Table 2 presents the bisimulation ISBN:
5 relation between the states of Т DSC and Т Diameter which satisfies the Definition 2. Based on the bisimulation relation between the states of Т DSC S and Т Diameter it can be concluded that Т DSC and Т Diameter expose equivalent behavior. Table 2 Bisimulation relation between T DSC and Т Diameter s 1 a â s 2 s 1, s 2 S DSC t 1 datasessionsetup Established DSC Established DSC datasessionsupervision- Event Established DSC Established DSC release Established DSC datasessiondisconnected release datasessiondisconnected Established DSC, Established DSC, t 2 t 1, t 2 S Diameter Idle AAR ISE AAR FSE AAR MCR, AAR GC, RAR EN, AAR ISM, AAR FSM STR ST Idle ASR ABR Idle STR ST Idle ASR ABR Idle Idle The detailed formal description of both models representing the packet data session states as view by the application and by the network, including behavior in case of errors makes possible to automate the process of generation of test sequences to verify the functional behavior of the OSA gateway. 5. Conclusion The deployment of third party control on packet data sessions in the EPS requires provisioning of open access to network functions related to policy and charging control. External applications access.the policy and charging functions using OSA Data Session Control interfaces instead of network control protocols. A key role in this context plays the OSA gateway which needs to perform interoperability functions mediating between applications and network entities. The suggested formal approach to functional verification of OSA gateway may facilitate its implementation and shorten the time to market for differentiated services. Acknowledgement: The research is in the frame of Project DDBY02/13/ funded by National Science Fund, Bulgarian Ministry of Youth, Education and Science. References: [1] J. Balbas,, S. Rommer, J. Stenfelt, Policy and charging control in the evolved packet system, IEEE Communications Magazine, 2009, vol.47, issue 2, pp [2] S. Quellette, L. Marchad, Pierre, Samuel, A potential evolution of the policy and charging control/qos architecture for the 3GPP IETFbased evolved packet core, IEEE Communications Magazine, 2011, vol.49, issue 5, pp [3] L. Baleh, L. Suciu, J. Bonnin, Enriched connectivity-as-a-service for dynamic Mobile- Cloud, Proc. of IEEE Consumer Communications and Networking Conference CCNC 2012, pp [4] R. Copeland, N. Crespi, Policies to Enable Serving Untrusted Services on Alternative (Non- 3GPP) and Untrusted Access Networks in EPS, Proc. of IEEE Computer Software and Applications Conference Workshops COMPSACW 2011, pp ISBN:
6 [5] B. Odadzic, M. Jankovic, Open service access (OSA) business models and service level agreement aspects, Proc. of IEEE International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service TELSIKS 2003, vol.1, pp [6] J. Yang, H. Park, A Design of Open Service Access Gateway for Converged Web Service, Proc. of International Conference on Advanced Communication Technology, ICACT 2008, pp [7] M. Adeyeye, Future directions of converged services in the Web session mobility scenarios, Proc. of International Conference AFRICON 2011, pp.1-5. [8] H. Hanrahan, Network Convergence, Services, Applications, Transport and Operations Support, Wiley, [9] 3GPP TS Open Service Access (OSA); Application Programming Interface (API) Part 8: Data Session Call Control Service Capability Feature; Release 9, 2009, v [10] 3GPP TR Open Service Access (OSA); Mapping for Open Service Access; Part 4, Call Control Service Mapping; Subpart 2: API to CAP mapping, Release 9, 2009, v [11] I. Chlamtac, H. Lee, Y Lin, M Tsai, An OSA service capability server for mobile services, International Journal of Pervasive Computing and Communications, 2008, vol. 4, issue 3, pp [12] T.Magedanz, D. Witaszek, K. Knüttel, Service Delivery Platform Options for Next Generation Networks, approved within the national German 3G Beyond Testbed, 2004, Retrieved from 04/Plenary/Magedanz.pdf [13] S. Walker, Providing IMS Services to Legacy Network Endpoints, 2009, Retrieved from st_corner.pdf. [14] 3GPP TS Policy and charging control architecture, Release 12, v12.0.0, [15] 3GPP TS Policy and Charging Control signaling flows and Quality of S ervice (QoS) parameter mapping, Release 11, v11.6.0, [16] P. Panangaden, Notes on Labeled Transition Systems and Bisimulation, 2009, Retrieved from 330/Notes/lts09.pdf. ISBN:
Open Access to Call and Session Control in Mobile Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 10, No 1 Sofia 2010 Open Access to Call and Session Control in Mobile Networks Evelina Pencheva, Ivaylo Atanasov Technical
Service Broker Function in IMS Architecture - Issues and Considerations
12th WSE International Conference on COMPUTERS, Heraklion, Greece, July 23-25, 2008 Function in IMS Architecture - Issues and Considerations HUI-NA CHUA, CHOR-MIN TAN Malaysian Research Centre, British
II. Service deployment
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Integration of Services Implemented on Different Service Platforms Evelina Pencheva, Ivaylo Atanasov Technical
Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements. T. Grgic* and M.
Int. J. Intelligent Information and Database Systems, Vol. X, No. Y, xxxx 1 Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements T. Grgic* and M.
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Diameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non
OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
A business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:[email protected] Mr.Ketan
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT
Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks
An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros
Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile
Advanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:
Security considerations for IMS access independence
3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
Interaction between an Online Charging System and a Policy Server
Interaction between an Online Charging System and a Policy Server Marc Cheboldaeff Carrier Applications EMEA Alcatel-Lucent Ratingen, Germany [email protected] Abstract According to the
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
Adaptive Load Control of Service Oriented Architecture Server
Adaptive Load Control of Service Oriented Architecture Server I. Atanasov Key Words: Service Oriented Architecture; application server; admission control; load balancing. Abstract: This paper presents
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
A Proposed Model For QoS guarantee In IMSbased Video Conference services
International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical
Solution Architecture
CHAPTER 1 The Cisco Multiservice Packet Network Solution The Cisco Multiservice Packet Network Solution defines a multiservice point of presence (POP) architecture that allows Public Telephone and Telegraph
Demo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
MDM and Telco Service Development OMA Device Management and Platforms
MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview
Mobility Management for All-IP Core Network
Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Service Continuity Path to smooth user experiences
Path to smooth user experiences Qualcomm Incorporated June 2010 Table of Contents [1] Introduction... 2 [2] Architecture... 3 [3] Use case... 4 [4] Conclusion... 6 06/2010 Page i [1] Introduction Qualcomm
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
CS Fallback Function for Combined LTE and 3G Circuit Switched Services
EPC Voice over Circuit Switched Services Special Articles on SAE Standardization Technology CS Fallback Function for Combined and Circuit Switched Services The PP, an international standardization body
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,
PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
Architectural Overview of IP Multimedia Subsystem -IMS
Architectural Overview of IP Multimedia Subsystem -IMS Presented by: Masood Khosroshahy June 2006 B E G I N N I N G 1 Project supervisor: Prof. Elie Najm Simplified view of the layered architecture in
Building Robust Signaling Networks
ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept
Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
Logical Data Models for Cloud Computing Architectures
Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps
Service Delivery Platforms for Network Operators
Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing
230612 - AMC - Advanced Mobile Communications
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions
Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)
Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *
VoLTE esrvcc VSRVCC Inter-domain Handover Technologies in LTE for Voice (VoLTE) and TV Phone A data communication service called Xi (Crossy) has started in LTE. In the future, voice and TV phone services
Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Internet Communications Using SIP
Internet Communications Using SIP Delivering VolP and Multimedia Services with Session Initiation Protocol Second Edition Henry Sinnreich Alan B. Johnston WILEY Wiley Publishing, Inc. Contents Foreword
Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services
Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services Sunhwan Lim and Hyunjoo Bae Future Communications Research Laboratory, ETRI, Daejeon, Korea
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
Mobile Application Part protocol implementation in OPNET
Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX [email protected] Steven Dennett Personal Communications Sector Motorola
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
Efficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
MS Series: VolP Deployment Guide
Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using
INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE
INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE Voice over LTE SUBSCRIBER TECHNOLOGY White Paper Mobile operators have invested a lot of time and money in Intelligent Network (IN) services for
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem
GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document
METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
Cisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
Paving the Way to Next Generation Media and Signaling VoIP Gateways
Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving
Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks
BROADBAND UKRAINE: 12th June 2013, Kiev, Ukraine FOKUS Center for Next Generation Network Infrastructures (NGNI) Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile
Session Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
ETSI TS 101 329-2 V1.1.1 (2000-07)
TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Multimedia Service Platform
Multimedia Service Platform Turnkey solution for SIP based communications Adrian Georgescu AG Projects http://ag-projects.com Current telecommunications landscape From the old PSTN only the E.164 numbering
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
Lecture 4b AAA protocols (Authentication Authorization Accounting)
Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture
OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection. Scenarios
OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection Scenarios Edlic Yiu, Edwood Yiu, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail:
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum [email protected]
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 [email protected] Content Network Evolution and drivers VoIP Realizations
FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE
FROM TELEPHONY TO COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH COMMUNICATIONS APPLICATION NOTE CONTENTS INTRODUCTION / 3 INCREASE PRODUCTIVITY WITH A CONNECTED WORKSTATION
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
LTE CDMA Interworking
LTE CDMA Interworking ehrpd - Use of a Common Core and a Stepping Stone to LTE Mike Dolan Consulting Member of Technical Staff Alcatel-Lucent Overview ehrpd (evolved High Rate Packet Data*) ehrpd involves
Load Balancing Support for Self-Organizing IMS Networks
Load Balancing Support for Self-Organizing IMS Networks Christian Makaya, Ashutosh Dutta, Subir Das, Dana Chee, F. Joe Lin Telcordia Technologies, Inc. Piscataway, NJ, USA Email: [email protected]
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
