Normally, I refrain from posting any non-technical content. But when those in power threatens with nuclear weapons, there is so much in stake, that I have to make an exception.
The destiny of the world we know is in our hands. As someone raised in a communist country I can imagine how difficult it might be to get all the information to decide or even to take an action. But please, take the responsibility for your live, for the future of your children.
I’m sure you can find out who is saying lies and and who is showing the truth. I’m sure you can identify attacker and defender. I’m sure you can see who is using violence to protect his life, family and land and who does use violence against others, threatens with nuclear weapons and sends elite police units against his own people. Who is so coward that even doesn’t call war a war.
Perhaps you think, that there is nothing you can do. Vaclav Havel in The Power Of The Powerless said:
Say the truth, say it aloud and don’t collaborate with the lie. Remember Gandhi who was able to break the biggest empire of the world with his Non-cooperation movement.
Support and operation engineers don’t need to understand the majority of algorithms hidden in telecom software. But time to time it helps if you have an understanding of how some particular functionality is implemented.
The typical situation is Traffic Shaping or Overload Protection. Many operators want to understand and test, how their system behaves under a huge load of calls or messages. There are many ways how to implement these features, so let’s take a look at the most common ones.
The easiest way how to protect the system is to define some limit. For example, we can say that our SBC is able to handle only 1.2 mil. parallel calls. If we receive a new invitate which exceeds this threshold, we respond with system error.
Similarly, we can set a limit for CPU or memory consumption. Whenever we reach, let’s say 60 % of the CPU we raise an alarm and don’t allow any new call/registration. As soon as the resource utilization drops below the threshold again, we can resume the standard system behavior and accept new calls.
Sounds reasonable and simple, however, in case that the load is close to our limit – 60 % of CPU – it can lead to so called throttling causing system instability. The last thing which you desire for if you are facing high traffic.
GSMA Intelligence forecasts that the number of 5G connections globally will reach 1.3 billion by 2025, covering 40 percent of the world’s population or approximately 2.7 billion people. At that time, the Americas region is expected to account for over 260 million 5G connections or 20 percent of the global market.
The question everyone is asking in telco last couple of years is – do we really need 5G? Do we really need that throughput for our voice, video and messaging services? Can we significantly improve real-time communication services so that customers would be willing to pay for it? RCS aka Advanced Messaging is a great example of how difficult it can be to find the right business model for new technologies. EVS supported in 4G is more than what we need for voice calling. Although video calling is possible in 4G, not that many customers are using this option on their mobile devices. More popular than video is desktop-sharing, collaboration and communication in context. Well, lower latency and better throughput can be useful – but is it a reason strong enough to invest into the new 5G infrastructure, when collaboration applies mainly to fixed networks?
5G Drivers. Source GSMA
Still there are real-time communication applications which require low latency and huge amount of data so that 4G is not enough. Virtual Reality (VR) applications like 360-degree video will necessitate higher resolutions of 8K and above, and stereoscopic video (which separates left and right eye views in VR) also requires additional bandwidth. When most people hear about 3D video, holograms, Augmented Reality (AR) and Virtual Reality (VR), they mostly think about gaming. And yes, gaming can be a good example and people like to spend money for entertainment. But there are other examples, where AR and VR can make a difference.
Impossible not to mention. Ethereal – these days known as Wireshark – is twenty! In 1998 Gerald Combs publicly released its first version 0.2.0. And he truly changed the IT (and particulary telco) world. Over the years Wireshark has won several industry awards,and it is one of the top-rated sniffers. Wireshark is a real gift for every engineer who works with a protocol stack. At the same time many BIG companies don’t even realize what contribution Wireshark means to their daily business!
Thank you Gerald and everyone who has helped with this great project!
So we have a first robot citizen. When we read about human-robots they are presented as future cleaning-ladies, news anchors, soldiers or sex-machines.
Everyone can imagine possible threats. In the current world of spam and fake news robots can manipulate our reality even in a more advanced way. It’s not just a robot shop assistant which – by the way – mentions how great is a new laundry detergent or your joy-robot asking for an upgrade in a (im)proper time. It can also spy what you have at home, how much time you spend with various activities, assess your income or overhear conversation with your spouse – all, of course, in your best interest (let’s call it cookies 2.0). Not talking about real malware and ransomware.
In the same way participants in reality show forget about TV cameras, we’ll forget that robots are just robots. They don’t even need to look very real. Our brain is not that difficult to deceive. So the question is how to protect ourselves. At some point AI outsmarts human brain and we’ll need some help.
Let us know in comments section, what is your view and how to protect ourselves – e.g. how a new antispam sw/hw could look like.
Everyone knows that SIP headers like R-URI, To, From, P-Asserted-Identity, Path, Route and others contain Uniform Resource Identifiers (URI) – sip uri or tel uri. But do you know what formats we can use, with what parameters? As URI is one of the IP communication’s corner stones, it worth to have some better understanding.
SIP URI in VoLTE
Let’s start from the beginning. SIP URI is defined in RFC 3261, TEL URI in RFC 3966 (this RFC defines also modem and fax URL schemes).
SIP URI has a similar form to an email address. It contains typically a username and a hostname, for example email@example.com, where realtimecommunication.info is the domain of a SIP service provider. TEL URI is simply a telephone (landline or mobile) number as tel:+611234567890. It is needed mainly to support CS related scenarios and Mobile Number Portability (MNP). In practice we can see various forms of sip-uris:
Last but not least we have also a SIPS URI, which specifies that the resource is to be contacted securely. For that we use TLS as a transport layer protocol. The format for a SIPS URI is the same, except that the scheme is “sips” instead of sip. Note, that any resource described by a SIP URI can be “upgraded” to a SIPS URI by just changing the scheme, if it is desired to communicate with that resource securely.
GSMA has just recently published the final numbers for 2017. As expected the last year we’ve seen less 4G deployments than in 2016.
4G Deployments in 2017
The only exception was the RCS. (Btw. GSMA released its Universal Profile Version 2.0 for Advanced RCS Messaging.)
From the population coverage point of view the last year meant a great step forward. Although many developing countries have been still more focused on 3G (4G coverage is on average 35% there), the overall number of 4G coverage increased significantly.
As a trainer and blogger I have a chance to talk to many engineers from various (telco) companies. And I can hear a lot of similar complains. “We’re just reinventing a wheel, over and over again.”, “I feel like an investigator – to find the right information/documentation is so painful.”, “R&D doesn’t want to share anything.”, “They are not answering to my questions, they’re just sending a lot of crap to keep me busy.”, etc. The common denominator is that companies don’t encourage engineers to work aloud and share their experience and knowledge. Why? So much effort and talent is wasted.. And by encouraging I mean also that they don’t provide the right tools (no, it’s not sharepoint) and managers don’t lead by their examples.
This can’t be fixed by any process or action points. It is about company/team culture. If managers treat engineers as “resources”, act as if they are more important, or if they say “we’re not at work to make friends” (and some are even so dump to share it on social networks), it is hard to imagine that others would willingly share their know-how. Yes, there can be some lessons-learn filled after project, some reports created – but honestly, what engineers read these documents??
Have you heard about the IMS Centralized Services (ICS)? The basic idea is fairly simple. We want to apply services for IMS subscribers, regardless what access network they use. We know that in IMS we can do it for all IP-based access domains. But if the subscriber is accessing through the legacy CS network (e.g. because of a low LTE coverage in her area), we are still triggering the services in the CS Core network … right, unless we have the ICS in place. So ICS enables the IMS services even when one is using CS access for the media bearer.
IMS Centralized Services
The ICS is specified in GSMA IR.64 and 3GPP TS 23.292, 23.237 and 23.216. The scope of the specification includes:
Session establishment when using CS access for media transmission for an IMS service
IMS control of services where the media is transported via the CS network (e.g. managing of mid-call services)
Service data management
The solution is applicable for UEs with or even without ICS functionality. As the first step all the sessions have to be anchored in the IMS. That is a job for Service Centralization and Continuity Application Server (SCC AS). The SCC AS is on the signalling path for both the originating and terminating services. Using the initial Filter Criteria (IFC), the SCC AS is triggered as the first AS for originating sessions and as the last for terminating sessions.
Even in 2017 the telephone number remains the most universal identifier for real-time communication. And as the word is moving to be All-IP, we have to be able to translate the number into something more meaningful for routing in IP networks. The GSMA organization selected for this purpose the Electronic Number Mapping System (ENUM) and in 2007 released the first version of PRD IR.67.
ENUM based Routing
Moreover Mobile Operators in over 50 countries have to support Mobile Number Portability (MNP). Although for MNP is a great feature for end subscribers, it makes the signalling more complex and costly for the Operators. The MNP is not just a problem for signalling (routing) but also for billing and management of interconnect agreements. Last but not least it can be a significant issue for content and application providers who may not be aware of the change of the operator for a particular user.