Click here to load reader
View
31
Download
6
Embed Size (px)
Sentinel VoLTE Architecture
TAS-022-Issue 2.6.0-Release 1
August 2018
Sentinel VoLTE Architecture (V2.6.0)
Notices
Copyright © 2017 Metaswitch Networks. All rights reserved.
This manual is issued on a controlled basis to a specific person on the understanding that no part of the
Metaswitch Networks product code or documentation (including this manual) will be copied or distributed
without prior agreement in writing from Metaswitch Networks.
Metaswitch Networks reserves the right to, without notice, modify or revise all or part of this document
and/or change product features or specifications and shall not be responsible for any loss, cost, or
damage, including consequential damage, caused by reliance on these materials.
Metaswitch and the Metaswitch logo are trademarks of Metaswitch Networks. Other brands and products
referenced herein are the trademarks or registered trademarks of their respective holders.
2
Sentinel VoLTE Architecture (V2.6.0)
Contents
1 Sentinel VoLTE Architecture...................................................................................... 7
1.1 Intended audience....................................................................................................................... 7
1.2 Contents.......................................................................................................................................7
2 Overview.......................................................................................................................8
3 Product Overview........................................................................................................ 9
3.1 Open and fully-featured............................................................................................................... 9
3.2 MMTEL-AS and SCC-AS on the Rhino TAS............................................................................... 9
4 MMTel Services..........................................................................................................11
5 GSMA MMTel Supplementary Services................................................................... 12
5.1 Originating Identification Presentation/Restriction (OIP/OIR) (3GPP TS 24.607)......................12
5.2 Terminating Identification Presentation/Restriction (TIP/TIR) (3GPP TS 24.608)..................... 12
5.3 Communication Diversion (CDIV) (3GPP TS 24.604)................................................................13
5.4 Communication Hold (HOLD) (3GPP TS 24.610)......................................................................13
5.5 Communication Barring (CB) (3GPP 24.611)............................................................................ 13
5.6 Operator Determined Barring (ODB) (3GPP TS 24.315 and TS 24.041).................................. 14
5.7 Explicit Call Transfer (ECT) (3GPP TS24.629)..........................................................................17
5.8 Communication Waiting (CW) (3GPP TS24.615)...................................................................... 17
5.9 Ad-hoc multi-party conference (CONF) (3GPP 24.605)............................................................ 17
5.10 Anonymous Call Rejection (ACR) (3GPP TS24.611).............................................................. 18
5.10.1 XCAP interface (Ut)....................................................................................................18
6 Explicit Communication Transfer............................................................................ 19
6.1 Communication Transfer Modes................................................................................................19
6.2 Example Explicit Communication Transfer Call Flows...............................................................19
6.2.1 Blind ECT..................................................................................................................... 20
6.2.2 Consultive ECT............................................................................................................ 21
6.3 Instance models inside VoLTE.................................................................................................. 21
6.4 Charging.................................................................................................................................... 24
6.4.1 Out of Scope................................................................................................................ 24
7 Flexible Alerting.........................................................................................................25
7.1 What is Flexible Alerting............................................................................................................ 25
7.2 Group Members......................................................................................................................... 25
7.3 Alerting type............................................................................................................................... 25
3
Sentinel VoLTE Architecture (V2.6.0)
7.4 Flexible Alerting Features.......................................................................................................... 26
7.5 Flexible Alerting Mode Examples Call Flow...............................................................................26
7.5.1 Parallel Alerting for group type of multiple-users......................................................... 26
7.5.2 Parallel Alerting for group type of single-user.............................................................. 27
7.5.3 Sequential Alerting for group of type multiple-users.................................................... 28
7.5.4 Sequential Alerting for group type of single-user......................................................... 29
8 Session Transfer to Own Device..............................................................................31
8.1 Service description.....................................................................................................................31
8.2 Pre requisites............................................................................................................................. 31
8.3 Basic flow...................................................................................................................................31
8.4 Features.....................................................................................................................................32
9 Charging..................................................................................................................... 34
9.1 Multiple OCS support.................................................................................................................34
9.2 Re-authorization.........................................................................................................................35
9.3 CDR generation......................................................................................................................... 35
9.4 Use of a Prepaid SCP via CAP..................................................................................................35
10 SCC-AS Services..................................................................................................... 36
10.1 IMS Centralised Services (ICS) support.................................................................................. 36
10.2 Terminating Access Domain Selection (T-ADS)...................................................................... 37
10.2.1 Computing the Circuit Switched Routing Number......................................................38
10.2.2 The OC-Terminating-Domain Header........................................................................ 38
10.2.3 Extensibility................................................................................................................ 38
10.3 Service Continuity and Access Transfer.................................................................................. 39
11 Architecture Overview.............................................................................................42
11.1 Major components................................................................................................................... 42
11.1.1 JSLEE services.......................................................................................................... 43
11.2 Sentinel VoLTE in an LTE network.......................................................................................... 43
11.3 B2BUA architecture................................................................................................................. 43
11.3.1 iFC Triggering Chaining and the SCC and MMTEL................................................... 44
11.3.2 Co-location using the Rhino SIS................................................................................ 44
11.4 Subscriber Data Storage..........................................................................................................45
11.5 Supplementary services database...........................................................................................45
11.6 Media resource function.................................