Sentinel VoLTE Architecture - Metaswitch

[Pages:85]Sentinel VoLTE Architecture

TAS-022-Issue 2.7.0-Release 1 May 2018

Sentinel VoLTE Architecture (V2.7.0)

Notices

Copyright ? 2017 Metaswitch Networks. All rights reserved. This manual is issued on a controlled basis to a specific person on the understanding that no part of the Metaswitch Networks product code or documentation (including this manual) will be copied or distributed without prior agreement in writing from Metaswitch Networks. Metaswitch Networks reserves the right to, without notice, modify or revise all or part of this document and/or change product features or specifications and shall not be responsible for any loss, cost, or damage, including consequential damage, caused by reliance on these materials. Metaswitch and the Metaswitch logo are trademarks of Metaswitch Networks. Other brands and products referenced herein are the trademarks or registered trademarks of their respective holders.

2

Sentinel VoLTE Architecture (V2.7.0)

Contents

1 Sentinel VoLTE Architecture...................................................................................... 7

1.1 Intended audience....................................................................................................................... 7 1.2 Contents.......................................................................................................................................7

2 Overview.......................................................................................................................8 3 Product Overview........................................................................................................ 9

3.1 Open and fully-featured............................................................................................................... 9 3.2 MMTEL-AS and SCC-AS on the Rhino TAS............................................................................... 9

4 MMTel Services..........................................................................................................11 5 GSMA MMTel Supplementary Services................................................................... 12

5.1 Originating Identification Presentation/Restriction (OIP/OIR) (3GPP TS 24.607)......................12 5.2 Terminating Identification Presentation/Restriction (TIP/TIR) (3GPP TS 24.608)..................... 12 5.3 Communication Diversion (CDIV) (3GPP TS 24.604)................................................................13 5.4 Communication Hold (HOLD) (3GPP TS 24.610)......................................................................13 5.5 Communication Barring (CB) (3GPP 24.611)............................................................................ 13 5.6 Operator Determined Barring (ODB) (3GPP TS 24.315 and TS 24.041).................................. 14 5.7 Explicit Communication Transfer (ECT) (3GPP TS24.629)....................................................... 17 5.8 Communication Waiting (CW) (3GPP TS24.615)...................................................................... 17 5.9 Ad-hoc multi-party conference (CONF) (3GPP 24.605)............................................................ 17 5.10 Anonymous Call Rejection (ACR) (3GPP TS24.611).............................................................. 18

5.10.1 XCAP interface (Ut)....................................................................................................18

6 Explicit Communication Transfer............................................................................ 19

6.1 Communication Transfer Modes................................................................................................ 19 6.2 Example Explicit Communication Transfer Call Flows...............................................................19

6.2.1 Blind ECT..................................................................................................................... 20 6.2.2 Consultive ECT............................................................................................................ 21 6.3 Instance models inside VoLTE.................................................................................................. 21 6.4 Charging.................................................................................................................................... 24 6.4.1 Out of Scope................................................................................................................ 24

7 Flexible Alerting.........................................................................................................25

7.1 What is Flexible Alerting............................................................................................................ 25 7.2 Group Members......................................................................................................................... 25 7.3 Alerting type............................................................................................................................... 25

3

Sentinel VoLTE Architecture (V2.7.0)

7.4 Flexible Alerting Features.......................................................................................................... 26 7.5 Flexible Alerting Mode Examples Call Flow............................................................................... 26

7.5.1 Parallel Alerting for group type of multiple-users......................................................... 26 7.5.2 Parallel Alerting for group type of single-user.............................................................. 27 7.5.3 Sequential Alerting for group of type multiple-users.................................................... 28 7.5.4 Sequential Alerting for group type of single-user......................................................... 29

8 Session Transfer to Own Device..............................................................................31

8.1 Service description.....................................................................................................................31 8.2 Pre requisites............................................................................................................................. 31 8.3 Basic flow................................................................................................................................... 31 8.4 Features..................................................................................................................................... 32

9 Charging..................................................................................................................... 34

9.1 Multiple OCS support................................................................................................................. 34 9.2 Re-authorization.........................................................................................................................35 9.3 CDR generation......................................................................................................................... 35 9.4 Offline charging via Diameter Rf................................................................................................ 35 9.5 Use of a Prepaid SCP via CAP.................................................................................................. 35

10 SCC-AS Services..................................................................................................... 36

10.1 IMS Centralised Services (ICS) support.................................................................................. 36 10.2 Terminating Access Domain Selection (T-ADS)...................................................................... 37

10.2.1 Computing the Circuit Switched Routing Number...................................................... 38 10.2.2 The OC-Terminating-Domain Header........................................................................ 38 10.2.3 Extensibility................................................................................................................ 38 10.3 Service Continuity and Access Transfer.................................................................................. 39

11 Architecture Overview.............................................................................................42

11.1 Major components................................................................................................................... 42 11.1.1 JSLEE services.......................................................................................................... 43

11.2 Sentinel VoLTE in an LTE network.......................................................................................... 43 11.3 B2BUA architecture................................................................................................................. 44

11.3.1 iFC Triggering Chaining and the SCC and MMTEL................................................... 44 11.3.2 Co-location using the Rhino SIS................................................................................ 44 11.4 Subscriber Data Storage..........................................................................................................45 11.5 Supplementary services database........................................................................................... 45 11.6 Media resource function...........................................................................................................45 11.7 Cloud and virtualisation............................................................................................................46

4

Sentinel VoLTE Architecture (V2.7.0)

12 Cloud and Virtualisation......................................................................................... 47 13 XCAP Support.......................................................................................................... 48

13.1 XCAP architecture within the IMS............................................................................................ 48 13.2 Sentinel VoLTE and XCAP...................................................................................................... 48

13.2.1 HTTP URIs and XCAP............................................................................................... 49 13.3 Integration with Rhino Element Manager and Sentinel............................................................ 49

13.3.1 Integrated components.............................................................................................. 49 13.3.2 Diameter Sh stacks and Rhino clusters..................................................................... 50

14 XCAP Query Examples............................................................................................51

14.1 Get simservs document........................................................................................................... 51 14.2 Get active state of OIP supplementary service........................................................................ 52 14.3 Get default-behaviour of OIR supplementary service.............................................................. 52 14.4 Enable OIP supplementary service..........................................................................................53 14.5 Disable OIP supplementary service......................................................................................... 53 14.6 Set OIR default-behaviour to presentation-restricted...............................................................54 14.7 Set OIR default-behaviour to presentation-not-restricted........................................................ 55

15 Instance Architecture for Sentinel VoLTE.............................................................56

15.1 iFC triggering chaining and the SCC and MMTEL................................................................... 56 15.2 Co-location using the Rhino SIS.............................................................................................. 57

16 Third Party Registrar Architecture.........................................................................58 17 Charging Support.................................................................................................... 60

17.1 Charging instance model......................................................................................................... 60 17.2 Charging within the instance model......................................................................................... 61 17.3 SDP and charging.................................................................................................................... 62 17.4 Charging and Sessions Terminating in WiFi Networks............................................................ 63 17.5 Charging over Diameter Rf interface....................................................................................... 64 17.6 Population of AVPs on the Diameter Ro interface................................................................... 64

18 CAMEL and SIP support for SCC........................................................................... 65 19 Access to the HSS and HLR................................................................................... 67

19.1 HSS access............................................................................................................................. 67 19.2 HLR access..............................................................................................................................67 19.3 Supplementary Service Data................................................................................................... 68

20 Supplementary Service Data Access.....................................................................69

20.1 Supplementary Service Data stored in the HSS...................................................................... 69 20.2 Supplementary Service Data stored in the HLR...................................................................... 69

5

Sentinel VoLTE Architecture (V2.7.0)

21 SDP conflict management...................................................................................... 70

21.1 SDP conflict management overview........................................................................................ 70 21.2 Access transfer example..........................................................................................................71 21.3 SDP conflict types.................................................................................................................... 73

21.3.1 Session ID and version.............................................................................................. 73 21.3.2 Media descriptions removed...................................................................................... 74 21.3.3 Media descriptions added.......................................................................................... 74 21.3.4 Reusing a media description that was previously set to zero.....................................75 21.3.5 Payload type conflicts................................................................................................ 76 21.3.6 Conflict types not supported.......................................................................................77 21.4 Using SDP conflict management in a feature.......................................................................... 77 21.5 SDP encoding issues and workarounds.................................................................................. 77 21.5.1 Number of ports in media lines.................................................................................. 77

22 Session Tracking..................................................................................................... 79

22.1 Tracked Session Information................................................................................................... 79 22.2 Use of Cassandra Database.................................................................................................... 80

22.2.1 Row Time-to-Live....................................................................................................... 81 22.2.2 Consistency Level...................................................................................................... 81 22.2.3 Cassandra Schema....................................................................................................81 22.3 Minimising the impact of Database issues on Session processing..........................................82 22.4 Session Tracking Features...................................................................................................... 82

23 Shared ATU-STI....................................................................................................... 83

23.1 Co-ordinating Access Transfer................................................................................................ 83 23.2 A simple co-ordination example............................................................................................... 84 23.3 A more complex co-ordination example...................................................................................85

6

Sentinel VoLTE Architecture (V2.7.0)

1 Sentinel VoLTE Architecture

1.1 Intended audience

This document is intended for:

? network architects and engineers selecting and deploying VoLTE infrastructures ? solution architects defining solutions in the VoLTE space ? software developers using the Sentinel VoLTE to deliver services and features.

1.2 Contents

Find out here about:

? Sentinel VoLTE overview on page 8 -- an overview of the architecture and product ? XCAP support on page 48 -- support for XCAP, for user-equipment provisioning ? Instance architecture for Sentinel VoLTE on page 56 -- session processing and

instances

? Access to the HSS and HLR on page 67 -- an overview of use of the HSS and HLR ? Third Party Registrar architecture on page 58 -- an overview of the Third Party Registrar. ? Charging support on page 60 -- how Sentinel VoLTE supports charging ? Sh Cache RA architecture ? SDP conflict management on page 70 -- how Sentinel VoLTE resolves SDP conflicts

during access transfer

? CAMEL and SIP support for SCC on page 65 -- how Sentinel VoLTE interfaces to both

the GSM and IMS core networks.

7

Sentinel VoLTE Architecture (V2.7.0)

2 Overview

These sections provide an overview of Sentinel VoLTE and its architecture:

? Product Overview on page 9 ? Architecture Overview on page 42 .

8

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download