This document provides an overview of the IMS architecture from the perspective of an LTE user equipment. It describes the key components of IMS including the UE, Evolved Packet Core, and IMS core. It also discusses how IMS enables convergence across different access technologies, service types, and network functions to support multimedia services like voice and video over LTE.
The document describes the LTE protocol stack, which contains a user plane and control plane. It divides the protocol stack into layers for the radio network and transport network. The physical layer transfers data and performs error detection. The MAC sublayer maps transport channels to logical channels and handles scheduling. The RLC layer provides different reliability modes for data transfer. The PDCP layer performs header compression and ciphering. The RRC layer controls handovers, paging, and radio bearer setup. Transport protocols like IP, UDP, and GTP are used in the fixed network.
Long Term Evolution (LTE) is the next generation of mobile broadband technology that provides higher data rates and network throughput compared to 3G. LTE networks use OFDM and SC-FDMA for downlink and uplink, respectively, along with MIMO and an all-IP architecture to improve performance. The network elements include eNBs, SGWs, PDN GWs and MMEs. For operators, LTE provides an opportunity to increase ARPU through new applications and services while decreasing CCPU through an all-IP infrastructure. Mass deployment of LTE is expected to begin around 2012, with LTE Advanced enabling data rates up to 1 Gbps.
LTE is designed with strong cryptographic techniques, mutual authentication between LTE network elements with security mechanisms built into its architecture.
With the emergence of the open, all IP based, distributed architecture of LTE, attackers can target mobile devices and networks with spam, eavesdropping, malware, IP-spoofing, data and service theft, DDoS attacks and numerous other variants of cyber-attacks and crimes.
The document provides an overview of LTE (Long Term Evolution) technology. It discusses that LTE was standardized by 3GPP in 2008 to improve the performance and efficiency of wireless networks. Key aspects of LTE include the use of OFDMA for downlink and SC-FDMA for uplink, support for flexible bandwidths, and an evolved packet core network architecture. LTE aims to provide higher speeds, lower latency, and more efficient use of spectrum compared to previous 3G technologies.
The world is going wireless. For many years we have been discussing mobile broadband and always-on services and applications. This is maturing to reality with new devices in different shapes and forms such as mobile devices, tablets and netbooks. The introduction of LTE (Long Term Evolution) is the technology behind the compelling user experience required for their success. New industry initiatives such as VoLTE and VoLGA are allowing for real-time multimedia communication yet there are many challenges for realizing this technology.
The webinar will discuss the future of voice and SMS services, supplementary and Advanced Services in the era of all IP mobile networks, network architecture issues and interconnectivity with Legacy and current 2G and 3G access.
Deployment challenges and migration solutions will be covered as well as LTE network elements with the underlying standard IP Multimedia Subsystem (IMS) network infrastructure and endpoint devices. Speakers will discuss the development tools required, from the basic building blocks of IMS protocol stacks to the intricate details of application deployment. IMS standardization and interoperability efforts to overcome growing complexities of this new network architecture will be discussed as well.
By attending this webinar, you will learn:
• LTE and IMS market and technology trends
• Challenges in building Next Generation core and endpoint devices
• Unique requirements for Voice over LTE
• RADVISION solutions for LTE networks
Who should attend:
• Developers, architects
• Product Managers
• CTOs, VP R&D
• Marketing executives
Segments – Core Network Devices, SBCs, Media Gateways, Media Servers, Terminal End Points, and any other device that can connect to NGN/IMS Networks
Design and analysis 5G mobile network model to enhancement high-density subsc...
To obtain a high data rate that is commensurate with the growing demand for internet services, the fifth generation (5G) cellular networks will use the bandwidth beyond 6 GHz, called millimeters waves (mm-waves), to obtain a higher. The first phase (phase I) of the 5G network design for high user density, where the optimized microcells are deployed at carrier frequency 700 MHz with 20 MHz bandwidth. The second phase (phase II) of the design consists of the deployment of microcells which are operating at 3.6 GHz with 100 MHz bandwidth; this phase is planned to cover 200000 users within the province. The third phase (phase III) of the design is represented by the deployment of picocells, which are planned to operate at 26 GHz frequency and bandwidth 500 MHz; this phase is planned to cover 3,500,000 users within the province. Two types of modulation are adopted for the network (orthogonal frequency division multiplexing (OFDM) and 256 quadrature amplitude modulation (QAM)); the overall performance of the network is studied with regards to the percentage of coverage, power overlapping ratio, frequency interference, and quality of service (QoS).
The document contains questions and answers about LTE (Long Term Evolution) technology. LTE aims to improve spectral efficiency, lower costs, and improve services compared to previous standards. It provides peak download rates of at least 100 Mbps and round-trip times of less than 10ms. While LTE is considered a 4G standard, it does not fully meet the requirements in the ITU definition. LTE Advanced, which is still being developed, aims to meet the full ITU 4G requirements including peak rates of up to 1 Gbps for low mobility. The LTE architecture consists of the E-UTRAN access network and EPC core network.
I AM SUDANESE,MASTER OF TELECOM FROM SUDAN UNEVERSITY ,THIS IS MY DOCUMENT I INVESTIGATE IN LTE WITH MORE THAN 50 REFERENCE , GOD BLESS US ,PLEASE FEEL FREE TO ASK ABOUT ANY THING IN THIS TOPIC
MY EMAIL khalidaam2015@hotmail,khalidaa@sudatel.sd
دعواتكم لى وللوالدين ولاهلى , الحمد لله فبنعمته تتم الصالحات اللهم احفظ الدول الاسلامية من كل كيد واغدق عليهم الرخاء
The important goal of this thesis is represented as demonstrating a self-organising based process for current versions of heterogeneous LTE-Advanced networks to simultaneously improve both quality of service and ability. The main index terms of this research could be exhibited as: SON; LTE-A, HetNets; Femtocell; Interference, Multi-Layer; Handover, Access Control; Power Control, eICIC. The self-organizing method of this research is described as the primary goal, to be got through the following targets: ThesisScientist.com
The document discusses SoftX3000, an NGN network control system used in PTCL RWP. SoftX3000 implements call control and manages voice, data, and multimedia services over IP networks. It is compatible with PSTN exchanges and can function as a multimedia end office. The document describes SoftX3000's hardware, boards, signaling protocols, services, and technical specifications.
This tutorial has been designed for audiences with a need to understand the LTE technology basics in very simple terms. This tutorial will give you enough understanding on LTE technology from where you can take yourself at higher level of expertise.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
The proposed new network architecture and the emergence of various types of transmission technology will pose new challenges to 5G air interface technology standardization, program design, and simulation.
For physical layer transmission technology, 5G will introduce new waveform & nonorthogonal multiple access at the physical layer to achieve the required traffic latency in the air interface.
To explore spatial freedom & improve the network throughput, 5G will introduce massive MIMO technology. In the simulation evaluation system, massive MIMO & MU-MIMO technology will greatly increase computational interference complexity.
The new channel propagation model will be introduced based on high-frequency band transmission technology, D2D technology & massive MIMO technology.
Need to design scheduling algorithm for heterogeneous computing resources, accurately estimate the consumed time of heterogeneous computing & interface data transmission and meanwhile design the synchronized mechanism for computing tasks to make full use of heterogeneous computing platform.
https://telcomaglobal.com/p/5g-testing-training-certification
This document provides an overview of LTE training conducted by Cyberspace Department of Technical. It describes the key features and benefits of LTE technology, including higher spectrum efficiency, support for next generation apps, simplified network architecture, scalable bandwidth, high-speed mobility, roaming capabilities, and energy efficiency. It then details Cyberspace's LTE network, including its use of TDD in Lagos and Abuja, licensed frequency band, terminal devices, and the components that make up its radio access network such as antennas, remote radio units, baseband units, routers, and power distribution units. Finally, it discusses best practices for basic RF parameter measurement and troubleshooting common alarms.
The document describes the LTE protocol stack, which contains a user plane and control plane. It divides the protocol stack into layers for the radio network and transport network. The physical layer transfers data and performs error detection. The MAC sublayer maps transport channels to logical channels and handles scheduling. The RLC layer provides different reliability modes for data transfer. The PDCP layer performs header compression and ciphering. The RRC layer controls handovers, paging, and radio bearer setup. Transport protocols like IP, UDP, and GTP are used in the fixed network.
Long Term Evolution (LTE) is the next generation of mobile broadband technology that provides higher data rates and network throughput compared to 3G. LTE networks use OFDM and SC-FDMA for downlink and uplink, respectively, along with MIMO and an all-IP architecture to improve performance. The network elements include eNBs, SGWs, PDN GWs and MMEs. For operators, LTE provides an opportunity to increase ARPU through new applications and services while decreasing CCPU through an all-IP infrastructure. Mass deployment of LTE is expected to begin around 2012, with LTE Advanced enabling data rates up to 1 Gbps.
LTE is designed with strong cryptographic techniques, mutual authentication between LTE network elements with security mechanisms built into its architecture.
With the emergence of the open, all IP based, distributed architecture of LTE, attackers can target mobile devices and networks with spam, eavesdropping, malware, IP-spoofing, data and service theft, DDoS attacks and numerous other variants of cyber-attacks and crimes.
Lte training an introduction-to-lte-basicsSaurabh Verma
The document provides an overview of LTE (Long Term Evolution) technology. It discusses that LTE was standardized by 3GPP in 2008 to improve the performance and efficiency of wireless networks. Key aspects of LTE include the use of OFDMA for downlink and SC-FDMA for uplink, support for flexible bandwidths, and an evolved packet core network architecture. LTE aims to provide higher speeds, lower latency, and more efficient use of spectrum compared to previous 3G technologies.
The world is going wireless. For many years we have been discussing mobile broadband and always-on services and applications. This is maturing to reality with new devices in different shapes and forms such as mobile devices, tablets and netbooks. The introduction of LTE (Long Term Evolution) is the technology behind the compelling user experience required for their success. New industry initiatives such as VoLTE and VoLGA are allowing for real-time multimedia communication yet there are many challenges for realizing this technology.
The webinar will discuss the future of voice and SMS services, supplementary and Advanced Services in the era of all IP mobile networks, network architecture issues and interconnectivity with Legacy and current 2G and 3G access.
Deployment challenges and migration solutions will be covered as well as LTE network elements with the underlying standard IP Multimedia Subsystem (IMS) network infrastructure and endpoint devices. Speakers will discuss the development tools required, from the basic building blocks of IMS protocol stacks to the intricate details of application deployment. IMS standardization and interoperability efforts to overcome growing complexities of this new network architecture will be discussed as well.
By attending this webinar, you will learn:
• LTE and IMS market and technology trends
• Challenges in building Next Generation core and endpoint devices
• Unique requirements for Voice over LTE
• RADVISION solutions for LTE networks
Who should attend:
• Developers, architects
• Product Managers
• CTOs, VP R&D
• Marketing executives
Segments – Core Network Devices, SBCs, Media Gateways, Media Servers, Terminal End Points, and any other device that can connect to NGN/IMS Networks
Design and analysis 5G mobile network model to enhancement high-density subsc...journalBEEI
To obtain a high data rate that is commensurate with the growing demand for internet services, the fifth generation (5G) cellular networks will use the bandwidth beyond 6 GHz, called millimeters waves (mm-waves), to obtain a higher. The first phase (phase I) of the 5G network design for high user density, where the optimized microcells are deployed at carrier frequency 700 MHz with 20 MHz bandwidth. The second phase (phase II) of the design consists of the deployment of microcells which are operating at 3.6 GHz with 100 MHz bandwidth; this phase is planned to cover 200000 users within the province. The third phase (phase III) of the design is represented by the deployment of picocells, which are planned to operate at 26 GHz frequency and bandwidth 500 MHz; this phase is planned to cover 3,500,000 users within the province. Two types of modulation are adopted for the network (orthogonal frequency division multiplexing (OFDM) and 256 quadrature amplitude modulation (QAM)); the overall performance of the network is studied with regards to the percentage of coverage, power overlapping ratio, frequency interference, and quality of service (QoS).
The document contains questions and answers about LTE (Long Term Evolution) technology. LTE aims to improve spectral efficiency, lower costs, and improve services compared to previous standards. It provides peak download rates of at least 100 Mbps and round-trip times of less than 10ms. While LTE is considered a 4G standard, it does not fully meet the requirements in the ITU definition. LTE Advanced, which is still being developed, aims to meet the full ITU 4G requirements including peak rates of up to 1 Gbps for low mobility. The LTE architecture consists of the E-UTRAN access network and EPC core network.
I AM SUDANESE,MASTER OF TELECOM FROM SUDAN UNEVERSITY ,THIS IS MY DOCUMENT I INVESTIGATE IN LTE WITH MORE THAN 50 REFERENCE , GOD BLESS US ,PLEASE FEEL FREE TO ASK ABOUT ANY THING IN THIS TOPIC
MY EMAIL khalidaam2015@hotmail,khalidaa@sudatel.sd
دعواتكم لى وللوالدين ولاهلى , الحمد لله فبنعمته تتم الصالحات اللهم احفظ الدول الاسلامية من كل كيد واغدق عليهم الرخاء
The important goal of this thesis is represented as demonstrating a self-organising based process for current versions of heterogeneous LTE-Advanced networks to simultaneously improve both quality of service and ability. The main index terms of this research could be exhibited as: SON; LTE-A, HetNets; Femtocell; Interference, Multi-Layer; Handover, Access Control; Power Control, eICIC. The self-organizing method of this research is described as the primary goal, to be got through the following targets: ThesisScientist.com
The document discusses SoftX3000, an NGN network control system used in PTCL RWP. SoftX3000 implements call control and manages voice, data, and multimedia services over IP networks. It is compatible with PSTN exchanges and can function as a multimedia end office. The document describes SoftX3000's hardware, boards, signaling protocols, services, and technical specifications.
This tutorial has been designed for audiences with a need to understand the LTE technology basics in very simple terms. This tutorial will give you enough understanding on LTE technology from where you can take yourself at higher level of expertise.
UMTS/W-CDMA was initially designed for circuit-switched traffic and was not well-suited for growing IP data traffic. 3GPP made improvements through releases 5-8 to enhance HSDPA, HSUPA, and introduce LTE, providing higher data rates and capacity. LTE aims to meet increasing user demands for broadband connectivity by providing peak data rates up to 300 Mbps downlink and 75 Mbps uplink through improved radio interface features and reduced latency below 10ms. LTE can be deployed in existing UMTS bands and supports seamless handover between legacy networks to provide coverage.
This technical white paper provides an overview of Long Term Evolution (LTE):
1) LTE is being developed as the latest mobile network technology by 3GPP to improve end user throughput and latency. 2) LTE uses a new Evolved Packet Core network architecture and Evolved UMTS Terrestrial Radio Access Network, separating control plane and user plane functions. 3) LTE aims to provide downlink peak rates of 100Mbps and uplink of 50Mbps, low latency, and improved spectrum flexibility.
The document discusses the transition from 3G to LTE networks. It notes that data usage is growing significantly, placing pressure on networks. LTE aims to address this through a flat IP-based architecture, improved spectral efficiency from technologies like OFDMA and MIMO, and scalable bandwidth deployment. This will allow higher throughput and lower latency comparable to DSL, helping support new multimedia services and enriched user experiences with seamless connectivity at high speeds. Network operators can benefit from reduced costs per megabyte of traffic and a simpler architecture allowing flat-rate pricing plans.
Minimizing network delay or latency is a critical factor in delivering mobile broadband services; businesses and users expect network response will be close to instantaneous. Excess latency can have a profound effect on user experience—from excess delay during a simple phone conversation, reducing throughput at edge of cell coverage areas by reducing effectiveness of RAN optimization techniques, to slow- loading webpages and delays with streaming video. Response delays negatively impact revenue. In financial institutions, low latency networks have become a competitive advantage where even a few extra microseconds, can enable trades to execute ahead of the competition.
The direct correlation between delay and revenue in the web browsing experience is well documented. Amazon famously claimed that every 100 millisecond reduction in delay led to a one percent increase in sales. Google also stated that for every half second delay, it saw a 20 percent reduction in traffic.
For LTE network operators, control of latency is growing in importance as both an operational and business issue. Low latency is not only critical to maintaining the quality user experience (and therefore, the operator competitive advantage) of growing social, M2M, and real-time services, but latency reduction is fundamental to meeting the capacity expectations of LTE-A, where latency budgets will be cut in half and X2 will need to perform at microsecond speed.
Total network latency is the sum of delay from all the network components, including air interface, the processing, switching, and queuing of all network elements (core and RAN) along the path, and the propagation delay in the links. With ever tightening latency expectations, the relative contribution of any individual network element, such as a security gateway, must be minimized. For example, when latency budgets were targeting 150ms, a network node providing packet processing at 250μs was only adding 0.17% to the budget. However, in LTE-A, with latency targets slashed to 10ms, that same network node will consume almost 15x more of the budget. More important, when placed on the S1 with a target of only 1ms, 250 μs is 25% of the entire S1 latency allocation, and endangers meeting the microsecond latency needed at the X2. Clearly, operators need to apply stringent latency requirements for all network nodes, when designing LTE and LTE-A networks.
The document discusses intelligent networks and their operation. It introduces intelligent network components like the service control point (SCP) and service switching point (SSP). It describes how intelligent network services are registered and originated, going through authentication, announcement, and call routing procedures. It also addresses related standards, performance evaluation methods, and technical issues regarding security, evolution to IP networks, and cost effectiveness.
Ericsson is a multinational company founded in 1876 that provides telecommunication technology and services to 180 countries. It introduced the first phone in 1921 and was a leading brand in 2000. Key events included launching the first digital telephone in 1977 and introducing 4G networks in 2009. Ericsson aims to provide better communication and networking opportunities while upholding principles of equal opportunity and minimizing negative impacts. Though its market share declined after 2013, Ericsson remains a leading technology and services provider to customers in 180 countries.
The IT department at IMS is responsible for planning, implementing, securing and managing the organization's information and communication systems. This includes overseeing voice, data, imaging, internet and office automation systems. They develop budgets, policies and provide technical support to the board, founders, guests, staff, teachers, volunteers and customers. Outside vendors provide additional support services.
The visible aspects of IMS IT include many computers, devices, copiers, phones and audio/visual equipment. The less visible aspects involve complex network infrastructure with many hardware, software and technical standards. Future planning focuses on succession for the core database application and upgrading wiring at the retreat center.
4G networks aim to provide higher data transfer rates, support more users, and enable new applications compared to 3G networks. Key technologies required for 4G include OFDMA, MIMO, wider bandwidth channels between 100-200 MHz, and hybrid network architectures. Challenges in developing 4G networks include securing sufficient licensed spectrum, providing seamless coverage between different radio access technologies, developing caching technologies, and establishing network selection mechanisms. 4G aims to support applications like mobile TV with high resolution, telemedicine, location-based services, and seamless IP connectivity for users on the move.
The presentation discusses Voice over LTE (VoLTE) using IP Multimedia Subsystem (IMS). It provides a brief history of IMS and how it was developed for delivering multimedia services over GPRS networks. The key components of the IMS architecture are discussed, including the Proxy-Call Session Control Function (P-CSCF), Interrogating-CSCF (I-CSCF), and Serving-CSCF (S-CSCF). Session Initiation Protocol (SIP) is used in IMS to set up calls, with SIP messages flowing through the CSCF nodes. Examples are given of SIP message flows for call setup and termination. The presentation covers what happens when the user is out of coverage,
4G technology provides high-speed wireless internet access and multimedia services to users. It allows downloading of movies within minutes and streaming of high-definition content. 4G offers improved speeds over 3G through adoption of packet switching and use of wider bandwidth. While 4G promises affordable services and global access to internet, implementing its advanced capabilities poses challenges related to development of new hardware, network integration and meeting diverse user demands.
Wireless Application Protocol (WAP) is a standard for accessing information on the Internet via wireless devices like mobile phones. It uses protocols like WTP, WSP, WML and WTLS to provide an optimized experience for narrowband devices. Some key applications of WAP include banking, email, news, and mobile commerce. While it provides portability and convenience, WAP also faces challenges from small screens and slow speeds.
The document provides an overview of the IP Multimedia Subsystem (IMS) architecture, protocols, and services. Key points include:
- IMS provides an integrated architecture for multimedia services over different access networks through the use of IP.
- It allows for person-to-person and person-to-content communications using voice, text, pictures and video on both wireless and fixed networks.
- The IMS architecture includes the Call Session Control Function (CSCF), Home Subscriber Services (HSS), Application Servers, and other network elements that provide services like authentication, authorization, charging and quality of service.
- IMS supports multimedia applications and services like presence, instant messaging, push-
3G and WiFi are both wireless technologies but have key differences. 3G operates over licensed cellular networks owned by mobile carriers and offers continuous coverage over large areas but slower speeds. WiFi uses unlicensed spectrum to create local wireless networks with faster speeds but shorter ranges of about 100 meters. While 3G supports mobile services, WiFi is used for individual internet access. Both enable wireless connectivity but have different business models, with 3G following the mobile subscription model and WiFi equipment being purchased for local networks.
This document discusses General Packet Radio Service (GPRS), a mobile data service available on GSM networks. It introduces GPRS network architecture including new nodes like Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). The document describes how GPRS supports packet switched data transmission over GSM networks, allowing mobile users to access internet and corporate networks. It covers topics like GPRS protocols, quality of service, mobility management, and routing of data packets between mobile devices and external networks.
The document discusses Short Message Service (SMS) and its strengths and architecture. It describes how SMS uses signaling channels to transmit short messages of up to 160 characters globally. SMS is stateless, asynchronous, and always connected. The document outlines the SMS architecture including Short Message Mobile Terminated (SMMT) and Short Message Mobile Originated (SMMO) processes. It also discusses how SMS can be used as an information bearer and for value-added services and location-based services.
GSM and CDMA are two mobile network technologies. GSM was developed in Europe in the 1980s and uses TDMA to allow multiple users to access the network simultaneously. CDMA was developed later and uses code division multiple access, assigning each user a unique code. CDMA provides better voice quality and spectral efficiency compared to GSM. However, GSM networks and compatible devices are more widespread globally. Both technologies have continued to evolve with newer standards like GSM's EDGE and CDMA2000.
Management information system database managementOnline
The document discusses database management and related concepts. It defines database management as applying information systems technologies to manage an organization's data resources to meet business needs. It describes different database structures like hierarchical, network, relational, and object-oriented. It also discusses database development processes like conceptual design, entity-relationship modeling, normalization, and implementation. Data warehousing and data mining are also summarized.
Database Management Systems - Management Information SystemNijaz N
A DBMS is software that:Acts as an interface between application programs and the data files.Helps to reduce data redundancy and eliminate data inconsistency by allowing a central, shared data source
HiperLAN was developed as a wireless local area network standard by ETSI to provide higher data rates than early 802.11 standards. HiperLAN Type 1 achieved data rates up to 2 Mbps for ad hoc networking. HiperLAN Type 2 was later developed to provide connection-oriented service up to 54 Mbps, with quality of service guarantees, security, and flexibility. It uses OFDM in the 5 GHz spectrum for robust transmission. While early products only achieved 25 Mbps, the standard provides a framework for higher speeds as technologies advance. HiperLAN is intended to complement wired networks by providing wireless connectivity in hotspot areas like offices, homes, and public places.
Mobile communication technologies have evolved from 1G analog networks to 2G digital networks to 3G networks that allow data and voice. 4G networks aim to provide speeds of 100Mbps to 1Gbps using technologies like LTE and WiMax. 5G is envisioned to provide even higher bandwidth and connectivity through technologies that have not been fully developed yet. Each generation brings higher speeds and more advanced applications, but also faces challenges in areas like costs, bandwidth requirements, and developing technology standards.
The document summarizes the air interface protocol stack and channels in LTE. It discusses:
1. The protocol stack includes application, IP, and transport layers that process data and signaling messages. These pass to the physical layer which has transport, physical channel, and analog processors.
2. Logical, transport, and physical channels carry data and control information between protocol layers. Logical channels include dedicated and common channels. Transport channels include shared, broadcast, multicast and random access channels.
3. Physical channels are distinguished by how the physical layer manipulates and maps them. Major channels include shared, broadcast, multicast, random access and control channels.
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
This Presentation is explaining all about the Generations of Mobile or Cellular Technology (1G/2G/2.5/ 3G/4g/5G). This explain the invented details ,features,drawbacks,look of wireless models and comparison and evolution of technology from 1G to 5G and also explaining about wireless application and their services.
Towards Future 4G Mobile Networks: A Real-World IMS Testbedjosephjonse
In the near future, current mobile communication networks will converge towards an All-IP network in order to provide richer applications, stronger customer satisfaction, andfurther return on investment for the industry. However, such a convergence induces a strong level of complexity when handling interoperability between different operators and different handset vendors. In this context, the 3GPP consortium is working on the standardization of the convergence, and IMS is emerging as the internationally agreed upon standard that is multi-operator and multi-vendor. In this paper, we shed further light on the subtleties of IMS, and we delineate a blueprint for the implementation of a real-world IMS testbed. An open source Presence Server is deployed as well. The operation of the IMS testbed and the Presence Server are checked to assess their conformance with 3GPP standards. A simple third party application is developed on top the IMS testbed to further assess its operation.
TOWARDS FUTURE 4G MOBILE NETWORKS: A REAL-WORLD IMS TESTBEDijngnjournal
In the near future, current mobile communication networks will converge towards an All-IP network in order to provide richer applications, stronger customer satisfaction, andfurther return on investment for the industry. However, such a convergence induces a strong level of complexity when handling interoperability between different operators and different handset vendors. In this context, the 3GPP consortium is working on the standardization of the convergence, and IMS is emerging as the internationally agreed upon standard that is multi-operator and multi-vendor. In this paper, we shed further light on the subtleties of IMS, and we delineate a blueprint for the implementation of a real-world
IMS testbed. An open source Presence Server is deployed as well. The operation of the IMS testbed and the Presence Server are checked to assess their conformance with 3GPP standards. A simple third party application is developed on top the IMS testbed to further assess its operation.
The document provides an overview of IMS architecture, including elements like CSCF, HSS, MRF, and how IMS allows operators to deliver advanced services across different networks and devices. Key topics covered include IMS architecture layers, core network elements, call flows, service development within IMS, and how IMS fits into operator technology roadmaps. Standardization bodies that define IMS like 3GPP are also discussed.
The document discusses mobility management for voice over IP (VoIP) in heterogeneous wireless networks. It summarizes that future wireless networks will integrate various wireless access networks. For seamless mobility between these networks, the application-layer Session Initiation Protocol (SIP) is a good candidate due to its transparency to lower network layers and scalability. However, SIP can introduce delays due to its application-layer message processing. The document reviews mobility management protocols and their performance challenges for VoIP in heterogeneous wireless networks.
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”IRJET Journal
This document summarizes a research paper that analyzes the performance of an LTE 4G network running multimedia applications like VoIP and video conferencing. It discusses using the OPNET network simulator to study how these applications perform over LTE under static and mobile node conditions. The paper finds that multimedia applications experience less packet delay variation when nodes are mobile compared to static nodes, due to HARQ retransmission being given up under mobility. It also analyzes how varying network loads affect quality of service for multimedia applications sharing bandwidth with background data traffic.
The document summarizes the evolution of wireless network architectures from 1G to 5G and discusses key aspects of 4G and the vision for 5G. It describes how each generation (1G to 4G) has increased wireless bit rates. It then discusses the key components of 4G architecture including the Evolved Packet Core and flat IP architecture. The vision for 5G involves ubiquitous computing through convergence of technologies to provide connectivity anywhere at high speeds.
A novel adaptive schema to facilitates playback switching technique for video...IJECEIAES
The services of the video on demand (VoD) are currently based on the developments of the technology of the digital video and the network’s high speed. The files of the video are retrieved from many viewers according to the permission, which is given by VoD services. The remote VoD servers conduct this access. A server permits the user to choose videos anywhere/ anytime in order to enjoy a unified control of the video playback. In this paper, a novel adaptive method is produced in order to deliver various facilities of the VoD to all devices that are moving within several networks. This process is performed via mobility modules within the produced method since it applies a seamless playback technique for retrieving the facilities of the VoD through environments of heterogeneous networks. The performance of the simulation is tested for checking clients’ movements through different networks with different sizes and speeds, which are buffered in the storage. It is found to be proven from the results that the handoff latency has various types of rapidity. The method applies smooth connections and delivers various facilities of the VoD. Meantime, the mobile device transfers through different networks. This implies that the system transports video segments easily without encountering any notable effects.
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a preferred choice
for data for human to human (H2H) services and now it is becoming preferred choice for voice also. In
some developed countries the traditional 2G services gradually decommissioned from the service and
getting replaced with LTE for all H2H services. LTE provided high downlink and uplink bandwidth
capacity and is one of the technology like mobile ad hoc network (MANET) and vehicular ad hoc network
(VANET) being used as the backbone communication infrastructure for vehicle networking applications.
When Compared to VANET and MANET, LTE provides wide area of coverage and excellent infrastructure
facilities for vehicle networking. This helps in transmitting the vehicle information to the operator and
downloading certain information into the vehicle nodes (VNs) from the operators server. As per the ETSI
publications the number of machine to machine communication (MTC) devices are expected to touch 50
billion by 2020 and this will surpass H2H communication. With growing congestion in the LTE network,
accessing the network for any request from VN especially during peak hour is a big challenge because of
the congestion in random access channel (RACH). In this paper we will analyse this RACH congestion
problem with the data from the live network. Lot of algorithms are proposed for resolving the RACH
congestion on the basis of simulation results so we would like to present some practical data from the live
network to this issue to understand the extent RACH congestion issue in the real time scenario.
Video steaming Throughput Performance Analysis over LTEiosrjce
This document analyzes the video streaming throughput performance over LTE networks using the OPNET simulation tool. It simulates two scenarios: 1) downlink and uplink video conferencing with static users and 2) the same with users moving at 30m/s. The key metrics measured are packet delay variation and end-to-end delay. The results show that static users experience higher packet delay variation than mobile users, likely due to increased traffic accumulation. End-to-end delay is also higher for static users compared to those moving at 30m/s.
This document analyzes the video streaming throughput performance over LTE networks using the OPNET simulation tool. It simulates two scenarios: 1) downlink and uplink video conferencing with static users and 2) the same with users moving at 30m/s. The key metrics measured are packet delay variation and end-to-end delay. The results show that static users experience higher packet delay variation than mobile users, likely due to increased traffic accumulation. End-to-end delay is also higher for static users compared to those moving at 30m/s.
The document provides an overview of IMS (IP Multimedia Subsystem), including its history, architecture, layers, benefits, and relationship to SIP (Session Initiation Protocol). IMS allows convergence of voice, video, and data over an IP-based network using SIP and other IETF protocols. It has a service plane for applications, a control plane for session management, and a media plane for transport.
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Archi...CSCJournals
In this paper, we propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP Multimedia Subsystem (IMS) is used in the proposed architecture for providing a platform through which telecommunications operators can merge the various networks. A Session Initiation Protocol (SIP) REFER method which provides uninterrupted service continuity is introduced. The proposed LTE-WiMAX and LTE-WLAN tight coupled interworking is compared with the UMTS- WiMAX and UMTS-WLAN tight coupled interworking. The two heterogeneous networks are simulated using OPNET Modeler 17.1. Various metrics are obtained to test the performance of the proposed technique. Results show that successful VoIP session handoffs with acceptable Quality of Services (QoS) levels can be performed. Results also show that the proposed architecture outperforms the pervious architecture.
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET Journal
This document discusses the design and simulation of a Voice over Internet Protocol (VoIP) system for Adamawa State University in Nigeria using Cisco Packet Tracer. VoIP allows voice calls to be placed over an IP network like the internet rather than a traditional phone network. The proposed VoIP system would allow users across the university's campus to communicate freely using IP phones. The author conducted several simulations of the network architecture in Cisco Packet Tracer to develop a prototype VoIP system for the university. This would provide more flexible communication and help increase information sharing across the university's departments and offices by integrating them into a single network.
This document provides an overview of Bharat Sanchar Nigam Limited (BSNL), the largest telecom service provider in India. BSNL has a large fixed line and wireless network serving over 7,300 cities and towns and 5.5 lakh villages. It maintains a transmission network of over 19,100 km of optical fiber cables and microwave systems. BSNL provides interconnection facilities for other telecom operators to its national long distance and international long distance networks. The long distance network is divided into four maintenance regions covering different parts of the country.
The document discusses LTE and IMS technologies and their role in enabling new voice and messaging services. It introduces VoLTE as a solution for voice over LTE using IMS. IMS is presented as the solution that allows operators to continue providing services over LTE. The document also discusses the Rich Communication Suite (RCS) as an initiative to develop interoperable enriched communication services beyond voice and SMS. RADVISION solutions for IMS and RCS application development are also summarized.
J’son & Partners Consulting presents the results of the research “Equipment market and prospects of the implementation of new services based on the technology of transmitting multimedia content on the basis of the IP protocol (IP Multimedia Subsystem, IMS)”
More reports available on our website: http://bit.ly/16Znqpx
Find video about J’son & Partners Consulting on Json TV: http://bit.ly/1432QJV
Lawful interception monitoring using distributed architecture for ngn 2IAEME Publication
The document proposes a distributed architecture for lawful interception in Next Generation Networks (NGNs). It discusses the challenges of intercepting communications in complex IP-based networks. The proposed architecture is hierarchical, with a Central LI Entity connecting to Intermediate LI Entities that connect to Base LI Entities located at service provider gateways. This distributed approach reduces processing load while allowing centralized control and administration through the Central LI Entity. An example SIP-H323 call flow is discussed to demonstrate how lawful interception could be implemented using this architecture in heterogeneous networks.
5 G SYSTEMS IS THE FUTURE WILL BE FAST WITH UNIMAGINABLE SPEED AND WITH LOTS OF SERVICES.Though 5G is still in development stage it has lots of promising features that will definitely change our future. For this data hungry and speed loving generation 5G will definitely be the hottest technology and it will certainly make our future really exciting. In this article we will see how the mobile networks have evolved and what will be the future of mobile network and of course about 5G network.
volte ims network architecture tutorial - Explained Vikas Shokeen
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
A survey of integrating ip mobilitly protocols and mobile ad hoc networksSivam Manickam
The document provides an overview of integrating mobile ad hoc networks (MANETs) with the Internet using IP mobility protocols. It discusses:
1) IP mobility management protocols including Mobile IP for macro-mobility between domains and micro-mobility protocols like Cellular IP, HAWAII, and HMIP for movement within a domain.
2) 13 solutions for integrating MANETs with the Internet based mainly on Mobile IP and some supporting micro-mobility.
3) The benefits of integration, which allows MANET nodes to access the Internet, increase coverage beyond MANET boundaries, and provide mobility between MANETs. Integration faces challenges from MANET limitations and network dynamics.
The document discusses various handover procedures in LTE networks, including:
1. Intra-LTE handovers using the X2 interface or S1 interface when the MME and SGW do not change.
2. Inter-MME handovers using S1 that do not change the SGW.
3. Inter-MME/SGW handovers using S1 where both the MME and SGW change.
4. Inter-RAT handovers from LTE to UTRAN Iu mode, which involve reserving resources in the target UTRAN/GERAN network during a preparation phase before executing the handover.
- Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation technique that divides the available bandwidth into multiple orthogonal subcarriers.
- OFDM provides advantages over traditional Frequency Division Multiplexing (FDM) by making the subcarriers orthogonal, allowing them to overlap without interference and achieving higher spectral efficiency.
- The document provides an example of how OFDM works by taking a bit stream and mapping bits in groups of four to four orthogonal subcarriers at frequencies of 1, 2, 3, and 4 Hz using BPSK modulation before combining them to generate the OFDM signal.
With the rise of data-intensive mobile applications, network operators must find ways to increase network capacity to meet demand. MIMO (Multiple-Input Multiple-Output) techniques, which use multiple antennas at the transmission and reception ends, have the potential to significantly boost network throughput through spatial multiplexing. However, optimizing networks for MIMO's full benefits presents challenges, as MIMO works best under rich scattering conditions and requires accurate measurement of multipath environments. Real-world RF measurements tailored for MIMO networks can help operators overcome these challenges and maximize throughput gains from MIMO without additional spectrum or infrastructure.
This document describes the process of a successful LTE handover from a source eNodeB to a target eNodeB using the X2 interface. It involves measuring signal strengths, selecting a target cell, preparing the target for handover, executing the handover by redirecting data and radio resources to the target, and completing the handover by releasing resources from the source. Key steps include establishing bearers between the target and core network elements like MME and SGW, sending a handover command to the UE, and switching the data path from source to target after handover is completed.
The document describes the 3GPP LTE Radio Link Control (RLC) sub layer. It discusses RLC modes including transparent mode, unacknowledged mode, and acknowledged mode. For each mode it describes functions, state variables, procedures and interfaces. It also covers RLC PDU formats, configurable parameters, and transmission priority policies.
This document discusses the Packet Data Convergence Protocol (PDCP) sublayer in 3GPP LTE networks. It describes the key functions of PDCP including header compression, ciphering, integrity protection, and transmission of user and control plane data. It also explains PDCP's use of ROHC for header compression and the various PDCP protocol data unit formats used for control and user plane messages.
This document discusses the Medium Access Control (MAC) layer in 3GPP Long Term Evolution (LTE) cellular networks. It covers topics such as LTE channel architecture with physical, transport, and logical channels; functions of the MAC layer including mapping channels, error correction, priority handling, and logical channel prioritization; MAC sublayer organization in the downlink and uplink; and downlink and uplink channel types including their purposes and characteristics. Diagrams illustrate the protocol stack and channel relationships.
This document from EventHelix.com provides information about 3GPP LTE channels and the MAC layer. It describes the different logical and transport channels used in LTE, including the functions of the MAC layer such as mapping channels, error correction, and priority handling. Diagrams and explanations are provided for the downlink and uplink channel architectures, as well as the physical layer channels and signaling procedures like random access.
The document describes the LTE RRC connection setup messaging sequence between a UE (user equipment) and an eNodeB (base station). It involves the following steps:
1) The UE initiates a random access procedure by sending a random access preamble to the eNodeB.
2) The eNodeB responds with a random access response assigning the UE a C-RNTI and timing advance value.
3) The UE sends an RRC connection request message using the assigned resources with its UE identity and establishment cause.
4) The eNodeB sends an RRC connection setup message configuring radio bearers.
5) The UE responds with an RRC connection setup complete message
Three UEs (UE-A, UE-B, UE-C) initiate the random access procedure at the same time to connect to the eNodeB. UE-A and UE-B select the same preamble, resulting in a collision. UE-C selects a different preamble. The eNodeB responds to the preambles, assigning resources to UE-A and UE-C. During contention resolution, UE-A's connection request is acknowledged, while UE-B's collides and fails. UE-B then retries the random access procedure with a new preamble.
This document provides an overview of the LTE protocol stack, focusing on the data link layer (L2) which includes the MAC, RLC, and PDCP sublayers. It describes the architecture and functions of MAC including logical and transport channels, HARQ, scheduling, random access procedure, discontinuous reception, and more. It also covers the RLC sublayer including its different modes (TM, UM, AM) and functions like segmentation, reassembly and error correction. Finally it discusses the PDCP sublayer and its roles in header compression, security, and handover support. The document is intended to provide a systematic understanding of the LTE protocol stack for engineers working in areas like development, testing, optimization and trouble
This document discusses downlink physical channels and reference signals in LTE. It describes the functions of channels like the PDCCH, PDSCH, PBCH, and reference signals. It discusses design constraints for cyclic prefix length and subcarrier spacing based on delay spread and Doppler shift. It also summarizes the radio frame structure for different bandwidths and control format indicator values, calculating overhead and peak data rates.
The document describes CS fallback procedures for LTE networks, including an immediate-return (IR) scheme and a proposed delayed-return (DR) scheme. The IR scheme has the UE immediately return to LTE after a call is completed, while DR delays the return to avoid unnecessary CS fallbacks if another call is likely. Analytic models are developed to study the performance of IR and DR based on real network measurements. The study finds DR can reduce CS fallback costs by up to 60% compared to IR.
This document provides an overview of channel estimation strategies used in orthogonal frequency division multiplexing (OFDM) systems. It describes the basic types of channel estimation methods: block-type pilot channel estimation and comb-type pilot channel estimation. For block-type estimation, pilots are inserted into all subcarriers of OFDM symbols periodically. This allows estimation of the channel conditions between pilot symbols. Estimation can be done with least squares (LS), minimum mean-square error (MMSE), or modified MMSE. For comb-type estimation, pilots are inserted into certain subcarriers of each symbol, requiring interpolation to estimate data subcarriers. The document compares the implementation complexity and performance of different estimation methods.
The document summarizes key System Information Blocks (SIBs) in LTE. SIB1 contains cell access parameters and scheduling of other SIBs. SIB2 contains radio resource configuration information. SIB3 contains cell reselection parameters for intra-frequency, inter-frequency, and inter-RAT cells. SIBs 4-7 provide additional cell reselection parameters. SIB10-12 contain emergency alerting information for ETWS and CMAS notifications. The SIBs convey important cell and network configuration parameters to help user equipment access the network and perform functions like cell reselection.
The document discusses LTE as the de facto standard for mobile access networks. Key points include:
- LTE is designed for next generation networks and provides all-IP connectivity and consistent experience across access types.
- LTE release 8 supports peak downlink speeds up to 326 Mbps and uplink speeds up to 86 Mbps with 20 MHz bandwidth.
- LTE provides over 4x higher downlink throughput and 5x higher uplink throughput than HSPA+, improved spectrum efficiency, and supports FDD and TDD duplexing and scalable 1.4-20 MHz channel bandwidths.
The document summarizes the signaling flow between an eNodeB and MME during LTE attach and default EPS bearer setup procedures. It includes: (1) UE attach, authentication and security setup; (2) Establishment of two default EPS bearers for two PDNs; (3) Release of UE context due to inactivity and reestablishment using a service request.
This document discusses various topics related to Long Term Evolution (LTE) including call flow, radio link failure, discontinuous reception (DRX), paging, scheduling, random access channel (RACH) procedure, self-organizing networks (SON), and quality of service (QoS). It provides details on the call flow process when a user equipment (UE) is powered on, performs initial cell selection and attachment, and establishes a default bearer. It also describes procedures for radio link failure, DRX, paging, scheduling, RACH, SON functions including self-configuration and optimization, and QoS with default and dedicated bearers.
How to Store Data on the Odoo 17 WebsiteCeline George
Here we are going to discuss how to store data in Odoo 17 Website.
It includes defining a model with few fields in it. Add demo data into the model using data directory. Also using a controller, pass the values into the template while rendering it and display the values in the website.
Delegation Inheritance in Odoo 17 and Its Use CasesCeline George
There are 3 types of inheritance in odoo Classical, Extension, and Delegation. Delegation inheritance is used to sink other models to our custom model. And there is no change in the views. This slide will discuss delegation inheritance and its use cases in odoo 17.
How to Show Sample Data in Tree and Kanban View in Odoo 17Celine George
In Odoo 17, sample data serves as a valuable resource for users seeking to familiarize themselves with the functionalities and capabilities of the software prior to integrating their own information. In this slide we are going to discuss about how to show sample data to a tree view and a kanban view.
How to Install Theme in the Odoo 17 ERPCeline George
With Odoo, we can select from a wide selection of attractive themes. Many excellent ones are free to use, while some require payment. Putting an Odoo theme in the Odoo module directory on our server, downloading the theme, and then installing it is a simple process.
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Murugan Solaiyappan
Title: Relational Database Management System Concepts(RDBMS)
Description:
Welcome to the comprehensive guide on Relational Database Management System (RDBMS) concepts, tailored for final year B.Sc. Computer Science students affiliated with Alagappa University. This document covers fundamental principles and advanced topics in RDBMS, offering a structured approach to understanding databases in the context of modern computing. PDF content is prepared from the text book Learn Oracle 8I by JOSE A RAMALHO.
Key Topics Covered:
Main Topic : DATA INTEGRITY, CREATING AND MAINTAINING A TABLE AND INDEX
Sub-Topic :
Data Integrity,Types of Integrity, Integrity Constraints, Primary Key, Foreign key, unique key, self referential integrity,
creating and maintain a table, Modifying a table, alter a table, Deleting a table
Create an Index, Alter Index, Drop Index, Function based index, obtaining information about index, Difference between ROWID and ROWNUM
Target Audience:
Final year B.Sc. Computer Science students at Alagappa University seeking a solid foundation in RDBMS principles for academic and practical applications.
About the Author:
Dr. S. Murugan is Associate Professor at Alagappa Government Arts College, Karaikudi. With 23 years of teaching experience in the field of Computer Science, Dr. S. Murugan has a passion for simplifying complex concepts in database management.
Disclaimer:
This document is intended for educational purposes only. The content presented here reflects the author’s understanding in the field of RDBMS as of 2024.
Feedback and Contact Information:
Your feedback is valuable! For any queries or suggestions, please contact muruganjit@agacollege.in
Views in Odoo - Advanced Views - Pivot View in Odoo 17Celine George
In Odoo, the pivot view is a graphical representation of data that allows users to analyze and summarize large datasets quickly. It's a powerful tool for generating insights from your business data.
The pivot view in Odoo is a valuable tool for analyzing and summarizing large datasets, helping you gain insights into your business operations.
Credit limit improvement system in odoo 17Celine George
In Odoo 17, confirmed and uninvoiced sales orders are now factored into a partner's total receivables. As a result, the credit limit warning system now considers this updated calculation, leading to more accurate and effective credit management.
Integrated Marketing Communications (IMC)- Concept, Features, Elements, Role of advertising in IMC
Advertising: Concept, Features, Evolution of Advertising, Active Participants, Benefits of advertising to Business firms and consumers.
Classification of advertising: Geographic, Media, Target audience and Functions.
Beyond the Advance Presentation for By the Book 9John Rodzvilla
In June 2020, L.L. McKinney, a Black author of young adult novels, began the #publishingpaidme hashtag to create a discussion on how the publishing industry treats Black authors: “what they’re paid. What the marketing is. How the books are treated. How one Black book not reaching its parameters casts a shadow on all Black books and all Black authors, and that’s not the same for our white counterparts.” (Grady 2020) McKinney’s call resulted in an online discussion across 65,000 tweets between authors of all races and the creation of a Google spreadsheet that collected information on over 2,000 titles.
While the conversation was originally meant to discuss the ethical value of book publishing, it became an economic assessment by authors of how publishers treated authors of color and women authors without a full analysis of the data collected. This paper would present the data collected from relevant tweets and the Google database to show not only the range of advances among participating authors split out by their race, gender, sexual orientation and the genre of their work, but also the publishers’ treatment of their titles in terms of deal announcements and pre-pub attention in industry publications. The paper is based on a multi-year project of cleaning and evaluating the collected data to assess what it reveals about the habits and strategies of American publishers in acquiring and promoting titles from a diverse group of authors across the literary, non-fiction, children’s, mystery, romance, and SFF genres.
2. SPIRENT IMS Architecture | The LTE User Equipment Perspective
2 | www.spirent.com SPIRENT WHITE PAPER
TABLE OF CONTENTS
1. Executive Summary 3
2. Introduction 3
3. Why IMS? 4
3.1. The All-IP Network 4
3.2. The Big Convergence 5
3.3. Value Added By Cellular Operators 5
4. IMS Architecture 6
4.1. The UE 6
4.2. The Evolved Packet Core (EPC) 8
4.3. The IMS Core 9
5. Voice Service Over LTE 11
5.1. Evolutionary Steps 11
5.2. Requirements for Supporting VoLTE 13
6. Video Services Over LTE 14
7. Conclusion 14
8. Acronyms 15
3. www.spirent.com | 3SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
1. EXECUTIVE SUMMARY
The IP Multimedia Subsystem (IMS) dates from 3GPP release 5 over a
decade ago, but is now becoming a reality with the rollout of IMS-
based LTE networks. IMS enables convergence on multiple fronts,
including access types (fixed, mobile), service types, application
control functions and convergence between telephony and traditional
data delivery.
This paper presents a high-level technical view of the IMS
architecture as seen by LTE-capable User Equipment (UE), and is
part of a suite of associated literature available from Spirent. Others
include:
• White Paper - VoLTE Deployment Challenges and the Radio Access
Network – this paper examines the challenges of VoLTE deployment
with specific attention on the RAN features required to deliver
carrier-grade voice services on the LTE network.
• Reference Guide - IMS Procedures and Protocols: The LTE User
Equipment Perspective – discusses related procedures, protocols
and sample call flows (including VoLTE).
• IMS/VoLTE posters:
▸▸ LTE and the Mobile Internet – a high-level multi-generational architectural diagram connecting radio
access networks, core networks and application servers.
▸▸ IMS/VoLTE Reference Guide – a convenient reference relating industry specifications to the topics
most often addressed by mobile device designers.
2. INTRODUCTION
Over the past several years the IMS has been a topic of discussion for anyone connected with the wireless
industry. Since the introduction of IMS has most significantly affected wireless network equipment and its
deployment, much of the attention has been paid to the network itself. However, IMS and the deployment of
LTE have a significant effect on the operation of mobile devices.
This paper provides an overview of IMS, its architecture and applications from the perspective of the LTE User
Equipment (UE). It also provides a look at the evolution to a data-only LTE network and includes a discussion of
the challenges and requirements to support delivery of voice services (including VoLTE) over an all-IP network.
CORRESPONDING LITERATURE
WHITE PAPER
VoLTE Deployment Challenges
and the Radio Access Network
REFERENCE GUIDE
IMS Procedures and Protocols:
The LTE User
Equipment Perspective
POSTERS
LTE and the Mobile Internet
IMS/VoLTE Reference Guide
4. SPIRENT IMS Architecture | The LTE User Equipment Perspective
4 | www.spirent.com SPIRENT WHITE PAPER
3. WHY IMS?
The history of IMS began with the 3G.IP, a now-defunct consortium of major industry influencers. In the late
1990’s AT&T, BT, Rogers Cantel, Ericsson, Lucent, Nokia, Nortel Networks, Telenor TIM and others banded
together to bring an all-IP network to UMTS systems. The stated plan was to build on an evolved GPRS core
network and W-CDMA and EDGE air interfaces. At that time, IMS was thought to be solely intended for wireless
communications.
As IMS evolved, it became clear that the original stated requirements (such as voice transcoding, interconnection
between domains, access independence and a rudimentary concept of presence) could lend itself to bridging
gaps between wireless and wired networks, addressing one of several definitions of “convergence”.
3.1. THE ALL-IP NETWORK
For years, any mention of IMS simply referred to it as the “flat, all-IP network”. The evolution of communications
makes it clear that we are trending towards the efficiency offered by all-digital networks. Yet the Public Switched
Telephone Network (PSTN) implements concepts that have been in use since the early days of telephony… circuit-
switching is the classic example. An all-IP network promises vast cost savings and greatly increased efficiency.
As a result of the gradual evolution of telephony, digital traffic is often packaged as payload data in other
protocols. While the development of LANs and the Internet made IP the ubiquitous de-facto method of data
transfer, digital telephony often requires that IP packets are distributed as payload over other switching &
distribution techniques. For example, IP packets eventually delivered to a mobile device may have been
packaged into ATM cells which were transmitted within SONET frames. The realization of a true all-IP network
eliminates the overhead associated with multiple types of switching at multiple connection layers.
5. www.spirent.com | 5SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
3.2. THE BIG CONVERGENCE
The term “convergence” is so widely used in technological circles that it has taken on
many different meanings, several of which are being addressed by IMS.
Convergence of telephony and IP services – while today’s subscriber may see this
convergence as one that has already taken place within the mobile device, there are costs
and inefficiencies involved, due to the fact that these two functions of a phone require
connections to multiple networks using separate methodologies of delivery. IMS provides
a single network subsystem for all service types, including voice telephony.
Convergence of access technologies – IMS promises to make access technologies almost
immaterial, converging common access types (e.g. cellular, Wi-Fi, landline audio, LAN, etc.) around the IMS core.
Convergence of service types – today’s voice, audio and video services each use specific service-to-service
protocols, offering the opportunity for IMS to create efficiencies.
Convergence of location – today’s global traveler is connected to mobile applications through complex interfacing
of multiple networks and network types. The IMS concept of “presence” addresses the issue of presenting
communications and applications consistently and efficiently, without regard to the user’s physical location.
Convergence of control functions – To address tremendous growth in mobile applications, IMS offers a single set
of control and routing functions that can be shared by applications, rather than the application-specific control
and routing used today.
3.3. VALUE ADDED BY CELLULAR OPERATORS
IMS offers mobile operators a chance to offer added value in the delivery of data and applications. The most
prominent example today is the emergence of voice traffic. Voice-over-IP (VoIP) codecs make it possible for any
IP-based system, even the public Internet, to deliver better-than-POTS quality audio as a commodity.
However, the Internet is not equipped to guarantee levels of service consistent with the public’s expectations
for voice telephony. On a generic IP-based Public Data Network (PDN), load-balancing, latency and a host of
other parameters are done on a best-effort basis. By controlling the IMS core, cellular network operators are
able to offer specific Quality-of-Service (QoS) based on purchased service levels and on the requirements of the
applications themselves (e.g. latency requirements for voice).
6. SPIRENT IMS Architecture | The LTE User Equipment Perspective
6 | www.spirent.com SPIRENT WHITE PAPER
4. IMS ARCHITECTURE
Most discussions of the IMS include a graphic portrayal of its architecture in terms of a single flat network1
or as
three separate layers2
: the transport layer, the IMS layer and the service/application layer. While it is useful to
note that IMS is a multi-layered architecture (minimizing the number of connections required when compared
to a truly flat architecture), for the purposes of this paper the network is best understood as the combination
of user equipment (UE), transport, control functions and the applications. Figure 1 depicts a simplified view
of the related network from the point of view of the UE. For a more detailed depiction of the related network
connections, a poster titled LTE and the Mobile Internet is available for download from Spirent Communications.
Figure 1 - IMS with the LTE Evolved Packet Core
4.1. The UE
The UE is the terminal of the IMS architecture, and resides with the user. In IMS, the UE contains a Universal
Integrated Circuit Card (UICC) and a Session Initiation Protocol User Agent (SIP UA).
Figure 2 - The IMS-capable UE
SIP, the protocol used for IMS messaging, is defined in the IETF’s RFC 32613
. It is described in detail in a Spirent
reference guide titled IMS Procedures and Protocols: The LTE User Equipment Perspective.
1 3GPP TS 23.228: “IP Multimedia Subsystem (IMS); Stage 2”
2 TISPAN ES 282 007: “IP Multimedia Subsystem (IMS); Functional architecture”
3 Internet Engineering Task Force (IETF) RFC 3261: “SIP: Session Initiation Protocol”
7. www.spirent.com | 7SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
4.1.1. Universal Integrated Circuit Card (UICC)
Each UE includes a UICC, a smart card that contains one or more applications. The applications may be any or all
of the following:
• Subscriber Identity Module (SIM) – identity information used by a GSM network.
• UMTS Subscriber Identity Module (USIM) – identity information used by a UMTS or LTE network.
• CDMA Subscriber Identity Module (CSIM) or Re-Useable Identification Module (R-UIM) – identity information
used by a CDMA network.
• IP Multimedia Services Identity Module (ISIM) – identity information used by the IMS subsystem.
The ISIM contains:
• IP Multimedia Private Identity (IMPI) – Permanently allocated global identity assigned by a user’s home
operator. It is analogous to the International Mobile Subscriber Identity (IMSI) used in legacy technologies and
is transparent to the subscriber. It includes the home operator’s domain information.
• The home operator’s domain name.
• IP Multimedia Public Identity (IMPU) – Used to request communication with another user, the IMPU can be
roughly thought of as analogous to a telephone number. It can be either a sip URI, which resembles an email
address in appearance (sip:<username>@<host>:<port>) or a tel URI as defined in RFC 39664
(tel:<country_
code><national_destination_code><subscriber_number>). A device may have multiple IMPUs, and multiple
devices may share an IMPU.
• A long-term secret used to authenticate and calculate cipher keys. IMS actually does multiple levels of
authentication: with the transport network, with the radio access network (RAN), with the IMS core, etc. This
long-term secret is used in SIP registration.
If an ISIM is not present, a UE will default to using the USIM or CSIM.
4.1.2. The SIP User Agent (SIP UA)
The SIP UA is the logical terminal of the SIP network and both transmits and receives SIP messaging. It also
manages the SIP session from the terminal end.
In general, the SIP UA can be thought of as providing typical telephone functionality (e.g. dial, answer, hold,
transfer, etc.) via two separate roles:
• UAC (User Agent Client) – Sends SIP requests.
• UAS (User Agent Server) – Received requests and sends SIP responses.
4 Internet Engineering Task Force (IETF) RFC 3966: “The tel URI for Telephone Numbers”
8. SPIRENT IMS Architecture | The LTE User Equipment Perspective
8 | www.spirent.com SPIRENT WHITE PAPER
4.2. THE EVOLVED PACKET CORE (EPC)
The all-IP EPC used in LTE is a part of the transport block of the architecture, where “transport” is the entity
through which the overall network (e.g. the LTE Evolved Packet System [EPS]) is accessed. The transport block
includes backhaul/backbone as well as the access network.
4.2.1. The Public Data Network Gateway (PDN-GW or PDG)
The PDN-GW is a well-known entity in legacy digital networks, offering the UE access to public digital networks
(e.g. the Internet). In IMS there are typically separate PDN-GWs offering access to the Internet and the IMS
network.
In the case of LTE, the PDN-GW also serves as a mobility anchor point for users moving between LTE services and
non-3GPP services.
4.2.2. Policy and Charging Rules Function (PCRF)
The PCRF provides real-time determination of what types of traffic are allowed under what conditions, and also
determines how to account for this traffic (for billing purposes). Based on requests for IMS services, the PCRF
also initiates the appropriate bearers. Examples of PCRF functions might be:
• If a multi-user game is offered and the user attempts to start the service, the PCRF will determine whether that
user is authorized for the service.
• A network operator may determine that third-party VoIP services are allowed to use Wi-Fi connections but not
cellular connections. When a VoIP application is launched, the PCRF will determine whether the application
may continue.
• If a user attempts to launch a VoLTE call (and is authorized to do so), the PCRF will initiate the setup of the
dedicated bearer.
9. www.spirent.com | 9SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
4.3. THE IMS CORE
The IMS core provides session and media control.
Figure 3 - Interaction between the CSCF, HSS and other elements
4.3.1. Call Session Control Function (CSCF)
The CSCF is responsible for establishing, monitoring, supporting and releasing multimedia sessions. It is
comprised of three separate entities which may or may not be separate physical entities:
4.3.1.1. Proxy CSCF (P-CSCF)
The P-CSCF is seen as the initial point of contact from any SIP User Agent. It handles all requests from the UE
and is, from the UE’s point of view, the “SIP proxy” to the entire subsystem (via the I-CSCF and/or S-CSCF). It
may include a Policy Control Function (PCF) responsible for enforcing QoS policies on media. In terms of policy-
based networking outlined in RFC 27535
, the PCF is the policy server, or Policy Decision Point (PDP). This is
separate from the PCRF described earlier, which enforces policy on the transport network. Logically, the P-CSCF is
considered part of the visited network.
4.3.1.2. Serving CSCF (S-CSCF)
The S-CSCF is a SIP server logically seen as part of the home network and is analogous to the Home Location
Register (HLR) used in GSM. It “knows” about the user and what applications are available to the user, and is a
decision point as to whether or not the user’s SIP messages will be forwarded to the application servers.
The S-CSCF also stores addresses used for contacting the UE, so that it can be used in future sessions. It is also
the enforcement point of the network operator’s policies.
5 Internet Engineering Task Force (IETF) RFC 2753: “A Framework for Policy-based Admission Control”
10. SPIRENT IMS Architecture | The LTE User Equipment Perspective
10 | www.spirent.com SPIRENT WHITE PAPER
4.3.1.3. Interrogating CSCF (I-CSCF)
The I-CSCF is the entity that initiates the assignment of a user to an S-CSCF (by querying the HSS) during
registration. It is “seen” by the IMS core as a proxy to an individual user and is a liaison for SIP messaging
between the user (via the P-CSCF) and the S-CSCF.
4.3.2. Home Subscriber Server (HSS)
The HSS is a database that maintains user profile and location information and is responsible for name/
address resolution. It is also responsible for authentication and authorization, but unlike in legacy technologies,
authentication with the radio access network and the core can be different.
4.3.3. Subscriber Location Function (SLF)
The SLF keeps track of multiple HSSes in a home network, and is responsible for assigning one to a user.
4.3.4. Media Gateways
For detailed descriptions of the gateway interfacing between SIP-based networks and the legacy PSTN,
see RFC 33726
.
4.3.5. Media Gateway Control Function (MGCF)
The MGCF controls media gateways (MGWs), performs transcoding (converting codecs, for example from EVRC to
WB-AMR) and the conversion of media between the Real-time Transport Protocol (RTP) used in IMS and the Pulse-
Coded Modulation (PCM) used by a circuit-switched network.
Depending on how a network equipment manufacturer decides to implement, the MGCF may also serve as the
breakout to a circuit-switched network. In that case the MGCF is also responsible for managing the conversion of
signaling messages, converting SIP messaging to the Bearer Independent Call Control (BICC) and ISDN User Part
(ISUP) protocols used in legacy systems.
4.3.6. Breakout Gateway Control Function (BGCF)
If an MGCF does not include the breakout to a circuit-switched network, that functionality is performed by the
BGCF. When the BGCF does control this breakout it does so by selecting an MGCF (either in the same IMS network
or another IMS network) or by selecting an MGW (on a non-IMS-based network).
6 Internet Engineering Task Force (IETF) RFC 3372: “Session Initiation Protocol for Telephones (SIP-T): Context and Architectures”
11. www.spirent.com | 11SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
5. VOICE SERVICE OVER LTE
5.1. EVOLUTIONARY STEPS
A primary goal of LTE is to provide telco-grade voice services over a data-only LTE network.
Until VoLTE is ready for widespread commercial deployment, operators are faced with the challenge of providing
call continuity between LTE and legacy circuit-switched networks. As shown in Figure 4, 3GPP2 (CDMA) and 3GPP
(legacy UMTS) voice services have evolved in slightly different ways.
Figure 4 - Evolution of Voice Services with LTE Deployment
5.1.1. Simultaneous Voice and LTE (SVLTE)
For legacy 3GPP2 operators, SVLTE uses two radios to simultaneously communicate with:
• 1X network for services such as CS Voice, SMS, Emergency Services
• LTE network for high-rate PS data services
While this approach enables rapid deployment, it is not meant to be more than an interim measure. For one
thing the cost of two radios is absorbed into each and every SVLTE capable device. Other potential issues involve
interference between the radios, concern for exceeding maximum allowable output power levels (enforced per
device, not per band or per radio) and, of course, battery life.
12. SPIRENT IMS Architecture | The LTE User Equipment Perspective
12 | www.spirent.com SPIRENT WHITE PAPER
5.1.2. Circuit Switched Fallback (CSFB)
CSFB provides 3GPP network operators with a means to move from LTE to UMTS/GSM (or even 1X) services when
circuit-switched services (voice, SMS) are needed.
CSFB does allow for a single-radio (or single transmitter, dual receiver) design. Like SVLTE, it offers complete set
of circuit-switched services and features, even though the device is primarily operating in LTE mode. However,
packet-switched services are degraded when used on the slower legacy packet-switched network… this is an
issue because depending on the type of CSFB being used, packet-switched bearers may be interrupted. Finally,
the fallback mechanism takes some time, which translates into longer call setup times. Using this scheme, call
setup can take as long as a half a second.
The CSFB type used depends on the network available to fall back on, as well as the specifications release being
adhered to, as outlined in Table 1.
Destination RAT Option 3GPP Release
UMTS RRC Connection Release with Redirection (w/o Sys Info) Release 8
UMTS RRC Connection Release with Redirection (w/ Sys Info) Release 9
UMTS PS Handover with DRBs Release 8
GSM RRC Connection Release with Redirection (w/o Sys Info) Release 8
GSM RRC Connection Release with Redirection (w/ Sys Info) Release 9
GSM PS Handover with DRBs Release 8
GSM Cell Change Order (w/o NACC) Release 8
GSM Cell Change Order (w/ NACC) Release 8
Table 1 - CSFB Techniques
5.1.3. Voice Over LTE (VoLTE)
VoLTE is the service that once widely deployed, enables operators to provide improved QoS over legacy circuit-
switched voice service and “best-effort” Over The Top (OTT) services. VoLTE is defined in the GSM Association’s
(GSMA’s) Permanent Reference Document IR.927
. The document is intended to ensure interoperable SIP-based
IMS VoIP and SMS for UE’s and the LTE EPC. It defines basic IMS capabilities and supplementary services
for telephony, real-time media negotiation, transport and codecs, LTE radio and EPC capabilities (such as
establishing bearers and QoS) and functionality that is relevant across the protocol stack and subsystems.
Note that IR.92 provides a profile of minimum mandatory 3GPP capabilities.
A second related document, the GSMA’s IR.889
provides guidance for LTE roaming scenarios.
5.1.4. Single Radio Voice Call Continuity (SRVCC)
SRVCC allows a PS/IMS-based (VoLTE) Voice Call to transition to a legacy CS network. Unlike SVLTE and CSFB,
SVRCC does enable call continuity. SRVCC uses a single radio, and allows an operator to provide ubiquitous voice
coverage, even when LTE coverage is not complete.
However, the signaling required is complicated. The result is that there may be a brief break in audio service
when the call is transitioning to the circuit-switched network.
7 GSM Association Official Document IR.92: “IMS Profile for Voice and SMS”
8 3GPP TS 24.229: “Technical Specification Group Core Network and Terminals; IP multimedia call control protocol based on
Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3”
9 GSM Association Official Document IR.88: “LTE Roaming Guidelines”
13. www.spirent.com | 13SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
5.2. Requirements for Supporting VoLTE
From the UE’s point of view, there are four non-obvious requirements for a network to support VoLTE. The first
three of these, Semi-Persistent Scheduling, Transmission Time Interval Bundling and Discontinuous Reception,
are implemented at the MAC sub-layer. The fourth, Robust Header Compression, is implemented in the Packet
Data Convergence Protocol (PDCP) sub-layer.
5.2.1. Semi-Persistent Scheduling (SPS)
In LTE, DL and UL traffic channels are dynamically shared. The control channel (PDCCH) must be used to identify
which sub-frames should be decoded on the downlink PDSCH and which users are allowed to transmit in each UL
sub-frame (on the PUSCH). Without SPS, every Physical Resource Block (PRB) on the downlink and uplink must
be explicitly granted; the resulting overhead is inefficient for traffic that requires continual allocations of small
packets (such as VoIP).
This issue is addressed by SPS, which defines a transmission pattern and, based on that pattern, assigns a
pattern for PRBs to use going forward (unless there is a reason to change the pattern). As an example, suppose a
voice service uses one coded packet every 20ms. During silent periods, PRB assignments can be canceled. In the
uplink they can be implicitly canceled after a defined number of empty UL transmissions. In the downlink they
can be canceled with a Radio Resource Control (RRC) message.
5.2.2. Transmission Time Interval (TTI) Bundling
In order to reduce end-to-end latency, LTE introduced the idea of the short TTI (1 ms). This means that the Hybrid
Automated Request (HARQ) process is meant to acknowledge transmissions every 1 ms. However, at cell edges a
UE might not have enough time available to reliably deliver an entire VoIP packet in one TTI.
The solution is to bundle multiple TTIs together without waiting for HARQ feedback. A VoIP packet is sent as a
single packet data unit (PDU) during a bundle of subsequent TTIs, and the HARQ feedback is only expected after
the last transmission of the bundle. As in legacy technologies, RRC protocol is used to configure TTI bundles.
5.2.3. Discontinuous Reception (DRX)
A constantly-on voice session can quickly reduce battery life. Since VoLTE traffic is highly predictable (e.g. 20ms
codec packets), a UE receiver does not have to constantly monitor the PDCCH, and the receiver can essentially be
turned off between receptions. This must be carefully configured, though, since missing acknowledgements or
HARQ messages can add unacceptable latency.
5.2.4. Robust Header Compression (RoHC)
IP header information can be disproportionately large when compared to the relatively small VoLTE codec packets
being transmitted, creating inefficiency in terms of the air interface bandwidth.
For example, a combination of RTP, UDP and IP headers can total 40 to 60 bytes of header data, while using AMR-
WB at 14.4 kpbs yields payload data of about 50 bytes per 20 ms frame. In this case there may be more overhead
being transmitted than actual payload data. RoHC can sometimes compress headers down to the 2-4 byte range,
providing greatly improved efficiencies on the air interface.
14. SPIRENT IMS Architecture | The LTE User Equipment Perspective
14 | www.spirent.com SPIRENT WHITE PAPER
6. VIDEO SERVICES OVER LTE
Mobile video streaming and video chat are two services that are surging in growth driven by rapid smartphone
and tablet adoption and the rollout of LTE worldwide. As operators implement LTE, IR.9410
-based video calling
will generally follow IR.92 VoLTE in their service portfolio. Operators are keen to establish sufficient levels of
service quality and user experience to compete with the increasingly popular Over-the-Top (OTT) video chat
services. Various Key Performance Indicators (KPIs) such as Video Mean Opinion Score (V-MOS), frame loss,
audio-video sync and video impairment metrics, measured under real and varying network conditions, are used
to make improvements in devices, software and infrastructure.
7. CONCLUSION
IMS will, for the first time, shift carriers’ voice service offerings to the data realm. VoLTE is the first major IMS-
related application being rolled out on a large scale and the stakes are high. The combination of IMS, SIP and
RAN features as described in this document are essential in delivering the “carrier-grade” VoLTE experience.
UE testing and measurement, initially focused on IMS and SIP functional testing, is now concentrating on
both industry and operator-specified test requirements for VoLTE call performance and VoLTE user experience
evaluation. Aside from dealing with a network that is literally new to the core, UE designers must consider the
layered complexity of a multi-RAT, multi-band IMS-capable UE.
Spirent is a global leader in LTE device testing and is well positioned to support the industry with the many IMS/
VoLTE test challenges on the horizon. This white paper is the first in an ongoing series of tools aimed to educate
and support UE developers as they contribute to the deployment of IMS/VoLTE. A second white paper, sVoLTE
Deployment and the Radio Access Network: The LTE User Equipment Perspective” provides an overview of the
complexity of IMS/VoLTE deployment and a detailed understanding of the significant testing challenges.
Please see the Spirent website (www.spirent.com) for other free white papers, recorded seminars, posters and
other resources that may be helpful to the UE developer.
10 GSM Association Official Document IR.94: “IMS Profile for Conversational Video Service”
15. www.spirent.com | 15SPIRENT WHITE PAPER
SPIRENTIMS Architecture | The LTE User Equipment Perspective
8. ACRONYMS
ATM Asynchronous Transfer Mode
BGCF Breakout Gateway Control Function
BICC Bearer Independent Call Control
CS Circuit-Switched
CSCF Call Session Control Function
CSFB Circuit Switched Fallback
CSIM CDMA Subscriber Identity Module
DRX Discontinuous Reception
E-UTRAN Evolved Universal Terrestrial Radio Access Network
EPC Evolved Packet Core
EVRC Enhanced Variable Rate Codec
HARQ Hybrid Automated Request
HLR Home Location Register
HSS Home Subscriber Server
I-CSCF Interrogating Call Session Control Function
IMPI IP Multimedia Private Identity
IMPU IP Multimedia Public Identity
IMS IP Multimedia Subsystem
ISIM IP Multimedia Services Identity Module
ISUP ISDN User Part
MGW Media Gateway
MME Mobility Management Entity
OTT Over the Top
PCF Policy Control Function
PCM Pulse-Coded Modulation
PCRF Policy and Charging Rules Function
P-CSCF Proxy Call Session Control Function
PDCCH Physical Downlink Control Channel
PDCP Packet Data Convergence Protocol
PDG Public Data Network Gateway
PDN Public Data Network
PDN-GW Public Data Network Gateway
PDP Policy Decision Point
PDU Packet Data Unit
PRB Physical Resource Block
PSTN Public Switched Telephone Network
PS Packet-Switched
QoS Quality-of-Service
RoHC Robust Header Compression
RRC Radio Resource Control
RTP Real-time Transport Protocol
S-CSCF Serving Call Session Control Function
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SLF Subscriber Location Function
SONET Synchronous Optical Networking
SPS Semi-Persistent Scheduling
SRVCC Single Radio Voice Call Continuity
SVLTE Simultaneous Voice and LTE
TTI Transmission Time Interval
UA User Agent
UAC User Agent Client
UAS User Agent Server
UDP User Datagram Protocol
UE User Equipment
USIM UMTS Subscriber Identity Module
VoLTE Voice over LTE
WB-AMR Wideband Adaptive Multi-Rate