-
4G -5G INTERWORKING ARCHITECTURE:
Through our work with several mobile providers, we learned that majority of 5G deployments will be brownfield with upgrade from existing 3G/4G network. For mobile providers deploying 5G as greenfield new network, it has to interwork with 4G for roaming with other providers in same country or international roaming. Figure 1 provides a high-level overview […]
-
IMS Core Functionality & Features
The IMS is designed to provide number of key capabilities required to enable new IPservices via mobile and fixed networks. The important key functionalities whichenable new mobile IP services are: Multimedia session negotiation and management Quality of service management Mobility management Service execution, control and interaction Now we discuss the important features of IMS like […]
-
IMS Charging and QoS
IMS Charging Accounting is the process of collecting information about resource consumption. While accounting data can be used for multiple purposes such as capacity and trend analysis or cost allocation, it particularly forms the basis for the charging and latter billing of a user. The IMS defines two charging modes: online and offline. Online charging […]
-
IMS Session Management
After the registration, the user is able to access the services and starts session establishment process. This process is briefly explained as follows and depicted in figure The Caller’s UE (UE-A) constructs an INVITE request that includes registered public user identity of called user (UE-B). All SIP messages must traverse the Proxy Call Session Control […]
-
Addressing and Registration in IMS
The addressing in IMS is called SIP URI (Uniform Resource Identifier) and looks like an email address. In order to use IMS services, the UE must perform IMS registration. First the UE must obtain an IP connectivity bearer and discover an IMS entry point i.e. P-CSCF. After the P-CSCF discovery, the UE sends a SIP […]
-
Network Slicing in 5G
A network slice is a logical network serving a defined business purpose or customer, consisting of all required network resources configured together. It is created, changed and removed by management functions. Hence network slicing divides an operator’s physical network into multiple logical networks. These logical networks would permit the implementation of tailor-made functionality and network […]
-
IMS Architecture and Key Protocols
The IMS defines service provision architecture, and it can be considered as the next generation service delivery platform framework. It consists of modular design with open interfaces and enables the flexibility for providing multimedia services over IP technology. The IMS does not standardize specific services but uses standard service enablers e.g. presence, and supports inherently […]
-
IP Multimedia Subsystem (IMS) Security Challenges
Security and information protection is the core of all computer networks and communication systems. The convergence of fixed-mobile and voice-data networks has opened the door for the innovative and fancy next generation services and applications like integrated multimedia services, combining web browsing, email, instant messaging, presence, VoIP, video conferencing, application sharing, telephony, unified messaging, multimedia […]
-
5G Vs WiFi – Convergence or Competition
Guest post by Dr. Rizwan Ghaffar (linkedin) With the 5G deployment spreading rapidly, there is a question of what would be the future of Wi-Fi in the world connected by 5G. In my opinion, Wi-Fi and WWAN (wireless wide area networks) will continue their convergence/competitive journey along the road. They will coexist and play an […]
-
Question: From the perspective of UE why 5G is more secure than 2G/3G/4G?
Answer: The 2G GSM systems were the first digital systems that performed the authentication of subscriber. The mobile was assigned a temporary identifier after the authentication so that it does not has to send the mobile subscriber’s permanent identity ‘IMSI’ on the air interface. And the voice was encrypted. However, 2G systems suffered from two […]