Voice over LTE (VoLTE)

( 3 )

Overview

Describes the technological solutions and standards which will enable the migration of voice and SMS services over to LTE/EPC networks

Main drivers for the introduction of Long Term Evolution of UTRAN (LTE) is to provide far better end user experience for mobile broadband services. However, service providers also need to have a clear strategy of how to offer voice and messaging services for consumers and enterprises. The voice service over LTE is becoming increasingly important ...

See more details below
Hardcover
$106.28
BN.com price
(Save 3%)$110.00 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Hardcover)
  • All (10) from $87.54   
  • New (9) from $87.54   
  • Used (1) from $106.27   

Overview

Describes the technological solutions and standards which will enable the migration of voice and SMS services over to LTE/EPC networks

Main drivers for the introduction of Long Term Evolution of UTRAN (LTE) is to provide far better end user experience for mobile broadband services. However, service providers also need to have a clear strategy of how to offer voice and messaging services for consumers and enterprises. The voice service over LTE is becoming increasingly important when the smartphone penetration is increasing rapidly. Smartphones require both good quality voice and high speed broadband data.

This book provides the exhaustive view to industry-approved technologies and standards behind the Voice over LTE (VoLTE). Whether a decision maker or technology analyst, this book explains a topic of substantial global market interest.   It provides a good introduction to the technology and is useful for operators who may be deploying VoLTE, product managers responsible for VoLTE products and those who work in implementation and standardization of related technologies.

  • Provides a comprehensive overview of industry-approved technologies and standards, providing vital information for decision makers and those working on the technology
  • Written by authors working at the cutting edge of mobile communications technology today, bringing a mix of standards and product background, guaranteeing in-depth practical and standards information
  • Covering the technical and practical elements of VoLTE, explaining the various approaches for providing voice services over LTE
Read More Show Less

Editorial Reviews

From the Publisher

“It provides a good introduction to the technology and is useful for operators who may be deploying VoLTE, product managers responsible for VoLTE products and those who work in implementation and standardization of related technologies.” (Radio Electronics, 1 August 2012)

Read More Show Less

Product Details

  • ISBN-13: 9781119951681
  • Publisher: Wiley
  • Publication date: 3/6/2012
  • Edition number: 1
  • Pages: 266
  • Sales rank: 795,885
  • Product dimensions: 6.80 (w) x 9.90 (h) x 0.80 (d)

Table of Contents

Preface

Acknowledgements

List of Abbreviations

1 Background

2 VoLTE Deployment Strategies

2.1 Common Networks Everywhere

2.2 GSM/WCDMA View

2.3 CDMA View

3 VoLTE System Architecture

3.1 Overview

3.2 LTE Radio

3.2.1 LTE Radio Background

3.2.2 LTE Radio Architecture

3.3 Evolved Packet Core

3.3.1 What is the Evolved Packet Core?

3.3.2 EPC Entities and Functionalities

3.3.3 EPS Mobility Management

3.3.4 EPS Session Management and QoS

3.4 Control

3.4.1 What is an IP Multimedia Subsystem?

3.4.2 IMS Development History

3.4.3 IMS Fundamentals

3.4.4 IMS Entities

3.4.5 Home Subscriber Server

3.4.6 Policy and Charging Rule Function

3.5 Summary

4 VoLTE Functionality

4.1 Overview

4.2 Radio Functionalities

4.2.1 Bearers and Scheduling

4.2.2 Mobility

4.2.3 Circuit Switched Fallback Handover

4.2.4 Mobility from 2G/3G Back to LTE

4.2.5 Power Saving Features

4.2.6 Positioning Solutions

4.2.7 UE Radio Access Capabilities for VoLTE

4.3 EPC Functionalities

4.3.1 LTE subscriber identification

4.3.2 PDN Connectivity Establishment for the VoLTE User

4.3.3 EPS Dedicated Bearer Setup

4.4 IMS Identification

4.4.1 IP Multimedia Services Identity Module

4.4.2 Public User Identity

4.4.3 Private User Identity

4.4.4 Relationship between Private and Public User Identities

4.4.5 Identification of User’s Device

4.4.6 Identification of Network Entities

4.4.7 Identification of Services (Public Service Identities)

4.4.8 Identification Without ISIM

4.5 IMS Service Provisioning

4.5.1 Enforcement of Allowed Services

4.5.2 Service-Triggering Information

4.5.3 Selection of AS

4.5.4 AS Behaviour

4.5.5 Service Provisioning in Action

4.6 IMS Multimedia Telephony

4.6.1 Introduction

4.6.2 Multimedia Communication

4.6.3 Supplementary Services

5 VoLTE End to End and Signalling

5.1 Overview

5.2 VoLTE Subscription and Device Configuration

5.3 EPS Attach for CSFB/IMS VoIP and Default Bearer Activation

5.4 IMS Registration

5.4.1 Constructing the REGISTER Request

5.4.2 From the UE to the P-CSCF

5.4.3 From the P-CSCF to the I-CSCF

5.4.4 From the I-CSCF to the S-CSCF

5.4.5 S-CSCF Challenges the UE

5.4.6 UE’s Response to the Challenge

5.4.7 Registration at the S-CSCF

5.4.8 The 200 (OK) Response

5.4.9 Third-Party Registration to Application Servers

5.4.10 Subscription to Registration Event Package

5.4.11 Re-Registration and Re-Authentication

5.4.12 De-Registration

5.4.13 Related Standards

5.5 IMS VoIP Session

5.5.1 Constructing the INVITE Request

5.5.2 Routing

5.5.3 Media Negotiation

5.5.4 Media Resource Reservation and Policy Control

5.5.5 Charging

5.5.6 Session Release

5.5.7 Related Standards

5.6 Voice Continuity

5.6.1 PS-PS Intersystem Handover

5.6.2 Single Radio Voice Call Continuity

5.6.3 Summary

5.7 IMS Emergency Session

5.7.1 PDN Connection Setup for Emergency Session

5.7.2 Emergency Registration

5.7.3 Emergency Session

5.8 CS Fallback for Evolved Packet System Call Case(s)

5.8.1 Architecture of CS Fallback for EPS

5.8.2 Description of SGs Interface

5.8.3 Idle Mode Signalling Reduction and Use of CS Fallback for EPS

5.8.4 Idle Mode versus Active Mode UE with CS Fallback for EPS

5.8.5 CS Fallback Attachment

5.8.6 Mobile Originating Call Using CSFB

5.8.7 Mobile Terminating Call Using CSFB

5.8.8 Call Unrelated CSFB Procedures

5.8.9 Mobile Terminating Roaming Retry and Forwarding

5.8.10 Summary

5.9 VoLTE Messaging

5.9.1 Native IMS Messaging

5.9.2 SMS Interworking

5.9.3 Multimedia Messaging Service

5.9.4 Unstructured Supplementary Services Data Simulation in IMS

5.9.5 Summary

6 IMS Centralized Services

7 VoLTE Radio Performance

7.1 Coverage

7.2 Capacity

7.3 Latency

7.4 Summary

8 HSPA Voice over IP

References

Index

Read More Show Less

Customer Reviews

Average Rating 3.5
( 3 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(2)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted September 8, 2013

    Burnedsky

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 3, 2013

    Dismay

    Burnedtangle, Burnedbranch, Burnedleaf, Burnedshard, Burnedgrass, Burnedash. Continue, PLEASE!

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 2, 2013

    A Life Painted With Blood: Chapter 7

    "You're sure you don't want to come with us?"<br>Rocky nodded. "Clans ain't for me. I may'a been born there, but I was raised here."<br>Shardflight sighed. "Alright, then." They said their goodbyes, and the two Clan cats went out into the forest. Shardflight's thoughts swirled. 'What else didn't I know about my life? And why would she throw him out?' He remembered Thistlepaw's silvery pelt and realized Rocky's fur was much darker than his brothers'. 'No way...she didn't like the color of his pelt?! That's no reason to leave him for dead!'<br>As they trekked on, Burnedpaw noticed something shiny in the distance. "Hey! What's that?"<br>"Don't touch it!" Shardflight shouted as she bounded up to it.<br>"Shardflight, there's a mouse in there!" she said, staring at it.<br>Shardflight looked inside it, feeling sick. "That mouse is dead. This is probably a trap." He looked around. The mouse laid in a shrub–a very leafy shrub. Shardflight started pulling branches away and came across something like the fence at the rogue camp, only much smaller. "It...it's a cage!"<br>Burnedpaw started backing away from it, and Shardflight decided to follow suit. 'This is clearly a trap for cats...could that mean this is Clan territory?' But he couldn't scent any boundary markers. Then again, maybe Twolegs thought Clan cats would leave their territory to come this close to Twolegplace. Twolegs were stupid like that.<br>The two carefully went on their way, steering clear of any traps they saw...except for the one right in front of them. Shardflight hadn't heard Burnedpaw's warning and had wandered into one of the traps. It snapped shut as he tried to escape, and he lashed at the surrounding mesh to no avail. "Burnedpaw!" he yowled. "Keep searching for a Clan! They might be able to free me!"<br>But the apprentice shook her head. "I'm not leaving you. I'll get you out myself."<br>"Do what your mentor tells you!" But she ignored him and pawed at the latch on the front of the cage.<br>Once she figured out how to open it, she said, "Okay, I'm going to open it. Run out right away, because it's going to snap shut as soon as I let go." With that, she bit down on the latch and lifted the door with her paws. Shardflight ran out, but not quite fast enough. The door closed shut on Burnedpaw's paw, and she yowled it pain. Shardflight got it open again so she could get her paw out, and then let it snap shut again with nothing but the dead mouse inside.<br>"How's your paw?" he asked gently.<br>Shardflight was surprised by how stoic she was. "It's fine. I can't walk with it, but it's not that big a deal." She continued on with a limp, and Shardflight followed.<p>They camped in a tree that night. Shardflight could tell a Clan was nearby. 'Our journey's almost over,' he thought. 'Thank you, Kite, Adder, Rocky. You've all helped me learn more than I ever would have in a Clan.' He suddenly caught himself. 'Wait–I was in a Clan. What am I saying?'<br>Burnedpaw stared down at the ground. Something felt off. A strange scent hung in the air, one that she couldn't remember any cat having and yet familiar. 'What is it?' she wondered. 'Where could I have smelled that before?'<br>Several sets of eyes shown in the surrounding darkness, though neither Clan cat noticed them. A deep voice said for only the others to hear, "It seems we missed a couple. Let's finish what we started two moons ago."<p>Okay, so, can anyone think of a good warrior name for Burnedpaw? Just curious.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)