≡ Menu

Q. What is FTTH? Ans. FTTH stands for Fiber to the Home Q. What is GPON? Ans. GPON stands for Gigabit Passive Optical Network. A passive optical network (PON) is a networkarchitecture that brings fiber cabling direct to the home using a point-to-multipoint scheme that enablesa single optical fiber to serve multiple premises & Customers. [...]

{ 0 comments }

Through our work with several mobile providers, we learned that majority of 5G deployments will be brownfield with upgrade from existing 3G/4G network. For mobile providers deploying 5G as greenfield new network, it has to interwork with 4G for roaming with other providers in same country or international roaming. Figure 1 provides a high-level overview [...]

{ 0 comments }

The IMS is designed to provide number of key capabilities required to enable new IPservices via mobile and fixed networks. The important key functionalities whichenable new mobile IP services are: Multimedia session negotiation and managementQuality of service managementMobility managementService execution, control and interaction Now we discuss the important features of IMS like addressing, registration, chargingand [...]

{ 0 comments }

IMS Charging Accounting is the process of collecting information about resource consumption. While accounting data can be used for multiple purposes such as capacity and trend analysis or cost allocation, it particularly forms the basis for the charging and latter billing of a user. The IMS defines two charging modes: online and offline. Online charging [...]

{ 1 comment }

After the registration, the user is able to access the services and starts session establishment process. This process is briefly explained as follows and depicted in figure The Caller’s UE (UE-A) constructs an INVITE request that includes registered public user identity of called user (UE-B).All SIP messages must traverse the Proxy Call Session Control Function [...]

{ 1 comment }

The addressing in IMS is called SIP URI (Uniform Resource Identifier) and looks like an email address. In order to use IMS services, the UE must perform IMS registration. First the UE must obtain an IP connectivity bearer and discover an IMS entry point i.e. P-CSCF. After the P-CSCF discovery, the UE sends a SIP [...]

{ 1 comment }

A network slice is a logical network serving a defined business purpose or customer, consisting of all required network resources configured together. It is created, changed and removed by management functions. Hence network slicing divides an operator’s physical network into multiple logical networks. These logical networks would permit the implementation of tailor-made functionality and network [...]

{ 0 comments }

The IMS defines service provision architecture, and it can be considered as the next generation service delivery platform framework. It consists of modular design with open interfaces and enables the flexibility for providing multimedia services over IP technology. The IMS does not standardize specific services but uses standard service enablers e.g. presence, and supports inherently [...]

{ 0 comments }

Security and information protection is the core of all computer networks and communication systems. The convergence of fixed-mobile and voice-data networks has opened the door for the innovative and fancy next generation services and applications like integrated multimedia services, combining web browsing, email, instant messaging, presence, VoIP, video conferencing, application sharing, telephony, unified messaging, multimedia [...]

{ 0 comments }

Guest post by Dr. Rizwan Ghaffar (linkedin) With the 5G deployment spreading rapidly, there is a question of what would be the future of Wi-Fi in the world connected by 5G. In my opinion, Wi-Fi and WWAN (wireless wide area networks) will continue their convergence/competitive journey along the road. They will coexist and play an [...]

{ 0 comments }