Site icon Sajid A. Rabby

๐—ฉ๐—ผ๐—ถ๐—ฐ๐—ฒ ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—ช๐—ถ๐—™๐—ถ (๐—ฉ๐—ผ๐—ช๐—ถ๐—™๐—ถ)

๐—ฉ๐—ผ๐—ช๐—ถ๐—™๐—ถ (๐—ฉ๐—ผ๐—ถ๐—ฐ๐—ฒ ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—ช๐—ถ-๐—™๐—ถ) is a technology that allows users to make voice calls over a Wi-Fi instead of a cellular network.
Its Architecture is composed of:
๐Ÿญ. ๐—ช๐—ถ-๐—™๐—ถ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ:
It can be any Wi-Fi access point, such as home routers, public Wi-Fi, or enterprise networks.
Does not process mobile signaling but provides the IP transport for voice data packets.
It could be:
๐Ÿš€ ๐—จ๐—ป๐˜๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ: When the Wi-Fi network is not managed by the mobile operator (e.g., public Wi-Fi hotspots or home networks).
๐Ÿš€ ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ: one that is managed or approved by the operator (e.g., operator-controlled Wi-Fi hotspots or enterprise network.)
๐Ÿš€ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜ ๐—ฉ๐—ผ๐—ช๐—ถ๐—™๐—ถ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€: UE connects directly to the IMS core over Wi-Fi ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฒ๐—ฃ๐——๐—š.

๐Ÿฎ. ๐—˜๐˜ƒ๐—ผ๐—น๐˜ƒ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐—ฐ๐—ธ๐—ฒ๐˜ ๐——๐—ฎ๐˜๐—ฎ ๐—š๐—ฎ๐˜๐—ฒ๐˜„๐—ฎ๐˜† (๐—ฒ๐—ฃ๐——๐—š) or ๐—ง๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ ๐—ช๐—ถ๐—ฟ๐—ฒ๐—น๐—ฒ๐˜€๐˜€ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—š๐—ฎ๐˜๐—ฒ๐˜„๐—ฎ๐˜† (๐—ง๐—ช๐—”๐—š):
๐—ฒ๐—ฃ๐——๐—š acts as a secure interface b/n the untrusted Wi-Fi network & the operatorโ€™s core network.
๐Ÿš€ Establishes an ๐—œ๐—ฃ๐˜€๐—ฒ๐—ฐ ๐˜๐˜‚๐—ป๐—ป๐—ฒ๐—น with the userโ€™s device for secure communication over Wi-Fi.
๐Ÿš€ Ensures authentication using credentials stored in the SIM (e.g., ๐—œ๐— ๐—ฆ๐—œ) in collaboration with HSS and the AAA Server.
๐—ง๐—ช๐—”๐—š is used when the Wi-Fi network is trusted by the mobile operator.
๐Ÿš€ It functions as a bridge b/n the Wi-Fi network and the operatorโ€™s core network.
๐Ÿš€ It does not use IPsec tunnels like the ePDG. Instead, it relies on the inherent security of the managed Wi-Fi network.
๐Ÿš€ It supports direct access to the Packet Gateway (P-GW) without requiring an ๐—ฒ๐—ฃ๐——๐—š.

๐Ÿฏ. ๐—˜๐˜…๐—ถ๐˜€๐˜๐—ถ๐—ป๐—ด ๐—–๐—ผ๐—ฟ๐—ฒ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฒ๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐˜€ with ๐—ฉ๐—ผ๐—ช๐—ถ๐—™๐—ถ adaptation to operate with the new interfaces, protocols & authentication capability. This includes (๐—œ๐— ๐—ฆ, ๐—›๐—ฆ๐—ฆ, ๐—”๐—”๐—”, ๐—ฃ-๐—š๐—ช, ๐— ๐—š๐—ช, ๐—ฃ๐—–๐—ฅ๐—™.)

๐Ÿฐ. ๐—ฉ๐—ผ๐—ช๐—ถ๐—ณ๐—ถ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—น๐—ฒ ๐˜‚๐˜€๐—ฒ๐—ฟ ๐—ฑ๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ (๐—จ๐—˜):
The userโ€™s smartphone or tablet, equipped with VoWiFi functionality ( ๐—ฆ๐—œ๐—ฃ ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—ฎ๐—ป ๐—œ๐—ฃ๐˜€๐—ฒ๐—ฐ ๐˜๐˜‚๐—ป๐—ป๐—ฒ๐—น) to the ๐—ฒ๐—ฃ๐——๐—š.

๐—–๐—ฎ๐—น๐—น ๐—™๐—น๐—ผ๐˜„ ๐—ถ๐—ป ๐—ฉ๐—ผ๐—ช๐—ถ๐—™๐—ถ
๐Ÿญ. ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป:
The device connects to the ๐—ฒ๐—ฃ๐——๐—š over Wi-Fi(permitted by AAA), creating a secure IPsec tunnel or directly to the ๐—ง๐—ช๐—”๐—š in the case of ๐˜๐—ฟ๐˜‚๐˜€๐˜๐—ฒ๐—ฑ WiFi.
Use ๐—›๐—ฆ๐—ฆ to authenticate the SIM credentials.
๐Ÿฎ. ๐—œ๐— ๐—ฆ ๐—ฅ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป:
Once authenticated, the ๐—จ๐—˜ registers with the IMS core using ๐—ฆ๐—œ๐—ฃ.
๐Ÿฏ. ๐—–๐—ฎ๐—น๐—น ๐—˜๐˜€๐˜๐—ฎ๐—ฏ๐—น๐—ถ๐˜€๐—ต๐—บ๐—ฒ๐—ป๐˜:
When a call is made, ๐—ฆ๐—œ๐—ฃ sets up the session b/n the calling & receiving parties.
Voice data flow via Wi-Fi network to the ๐—œ๐— ๐—ฆ ๐—ฐ๐—ผ๐—ฟ๐—ฒ & the recipient.
๐Ÿฐ. ๐—›๐—ฎ๐—ป๐—ฑ๐—ผ๐˜ƒ๐—ฒ๐—ฟ:
If the user moves out of Wi-Fi coverage, the call seamlessly transitions to ๐—ฉ๐—ผ๐—Ÿ๐—ง๐—˜ via the ๐—œ๐— ๐—ฆ core, maintaining continuity or ๐—ฆ๐—ฅ๐—ฉ๐—–๐—– may be used to handover to legacy ๐—–๐—ฆ.

Exit mobile version