Dr Moazzam Tiwana

  • Welcome!!!
  • Contact
  • Blog
  • Research/Publications
  • Udemy Courses
Illustration of a bird flying.
  • 4G -5G INTERWORKING ARCHITECTURE:

    Through our work with several mobile providers, we learned that majority of 5G deployments will be brownfield with upgrade from existing 3G/4G network. For mobile providers deploying 5G as greenfield new network, it has to interwork with 4G for roaming with other providers in same country or international roaming. Figure 1 provides a high-level overview […]

    August 23, 2021
  • IMS Core Functionality & Features

    The IMS is designed to provide number of key capabilities required to enable new IPservices via mobile and fixed networks. The important key functionalities whichenable new mobile IP services are: Multimedia session negotiation and management Quality of service management Mobility management Service execution, control and interaction Now we discuss the important features of IMS like […]

    August 23, 2021
  • IMS Charging and QoS

    IMS Charging Accounting is the process of collecting information about resource consumption. While accounting data can be used for multiple purposes such as capacity and trend analysis or cost allocation, it particularly forms the basis for the charging and latter billing of a user. The IMS defines two charging modes: online and offline. Online charging […]

    August 23, 2021
  • IMS Session Management

    After the registration, the user is able to access the services and starts session establishment process. This process is briefly explained as follows and depicted in figure The Caller’s UE (UE-A) constructs an INVITE request that includes registered public user identity of called user (UE-B). All SIP messages must traverse the Proxy Call Session Control […]

    August 23, 2021
  • Addressing and Registration in IMS

    The addressing in IMS is called SIP URI (Uniform Resource Identifier) and looks like an email address. In order to use IMS services, the UE must perform IMS registration. First the UE must obtain an IP connectivity bearer and discover an IMS entry point i.e. P-CSCF. After the P-CSCF discovery, the UE sends a SIP […]

    August 23, 2021
  • Network Slicing in 5G

    A network slice is a logical network serving a defined business purpose or customer, consisting of all required network resources configured together. It is created, changed and removed by management functions. Hence network slicing divides an operator’s physical network into multiple logical networks. These logical networks would permit the implementation of tailor-made functionality and network […]

    August 23, 2021
  • IMS Architecture and Key Protocols

    The IMS defines service provision architecture, and it can be considered as the next generation service delivery platform framework. It consists of modular design with open interfaces and enables the flexibility for providing multimedia services over IP technology. The IMS does not standardize specific services but uses standard service enablers e.g. presence, and supports inherently […]

    August 23, 2021
  • IP Multimedia Subsystem (IMS) Security Challenges

    Security and information protection is the core of all computer networks and communication systems. The convergence of fixed-mobile and voice-data networks has opened the door for the innovative and fancy next generation services and applications like integrated multimedia services, combining web browsing, email, instant messaging, presence, VoIP, video conferencing, application sharing, telephony, unified messaging, multimedia […]

    August 23, 2021
  • 5G Vs WiFi – Convergence or Competition

    Guest post by Dr. Rizwan Ghaffar (linkedin) With the 5G deployment spreading rapidly, there is a question of what would be the future of Wi-Fi in the world connected by 5G. In my opinion, Wi-Fi and WWAN (wireless wide area networks) will continue their convergence/competitive journey along the road. They will coexist and play an […]

    August 15, 2021
  • Question: From the perspective of UE why 5G is more secure than 2G/3G/4G?

    Answer: The 2G GSM systems were the first digital systems that performed the authentication of subscriber. The mobile was assigned a temporary identifier after the authentication so that it does not has to send the mobile subscriber’s permanent identity ‘IMSI’ on the air interface. And the voice was encrypted. However, 2G systems suffered from two […]

    August 14, 2021
←Previous Page
1 2 3 4
Next Page→

Dr Moazzam Tiwana

Proudly powered by WordPress