Signaling System #7 (SS7) is a set of telephony signaling protocols that are used to establish most of the world's public switched telephone network (PSTN) connections. The document discusses SS7 signaling, its protocol architecture, network architecture, call setup process, applications, interworking with IP networks, and the evolution to an all-IP network. It provides details on SS7 components like SSP, STP, and SCP and protocols like MTP, SCCP, TCAP, TUP, and ISUP. It also summarizes VoIP network configuration using SIGTRAN to carry SS7 over IP networks reliably.
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Presented by Pierre-Olivier Vauboin & Alexandre De Oliveira at Hackito Ergo Sum 2014
http://2014.hackitoergosum.org/
Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
Kirill Puzankov in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
In the past five years, technologies have converged to such an extent that one can transmit voice, fax and video over the same internet protocol network that one uses for data. This workshop examines Voice over IP (VoIP) technologies and provides you with the skills to competently implement a VoIP network for your organisation. Numerous case studies and exercises throughout the course ensure that you get a good grasp on the technologies used. Solid practical advice is given on application, implementation and most importantly troubleshooting these systems.
MORE INFORMATION: http://www.idc-online.com/content/practical-fundamentals-voice-over-ip-voip-engineers-and-technicians-3
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
Presented by Pierre-Olivier Vauboin & Alexandre De Oliveira at Hackito Ergo Sum 2014
http://2014.hackitoergosum.org/
Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.
VoLTE Flows and legacy CS network. Basic call routing to and from CS network using BGCF, MGCF, MGW. ENUM role in routing. IMS Cetralized Services (IMC) and SRVCC scenarios.
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
Kirill Puzankov in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
In the past five years, technologies have converged to such an extent that one can transmit voice, fax and video over the same internet protocol network that one uses for data. This workshop examines Voice over IP (VoIP) technologies and provides you with the skills to competently implement a VoIP network for your organisation. Numerous case studies and exercises throughout the course ensure that you get a good grasp on the technologies used. Solid practical advice is given on application, implementation and most importantly troubleshooting these systems.
MORE INFORMATION: http://www.idc-online.com/content/practical-fundamentals-voice-over-ip-voip-engineers-and-technicians-3
Channel Capacity and Uniform/Non-Uniform Signaling For FSO ChannlsAishwary Singh
This work considers the design of capacity approaching, non-uniform optical intensity signaling in the presence of average and peak amplitude constraints. It is known that the capacity achieving input distribution is discrete with a finite number of mass points, finding it requires complex non-linear optimization at every SNR. A simple expression for a capacity-approaching distribution is derived via source entropy maximization.
For queries
Aishwarya
palsinghaishwarya@gmail.com
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
Signaling System No. 7 is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network.
What is Signaling?Common Channel Signaling Modes?What is SS7?
Signaling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world's public switched telephone network (PSTN) telephone calls.
We are going to introduce it very quickly.
www.senatelecom.com
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some ...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. Contents
Types of Signaling
SS7 Signaling
SS7 Protocol Architecture
SS7 Network Architecture
Basic Call Setup
SS7 Applications
SS7/IP Inter-working
VoIP Network Configuration
SIGTRAN Protocol Stack Model
Network Evolution to an All-IP Network
3. Types of Signaling
Signaling in Telecommunications Network
Channel Associated Signaling (CAS)
Common Channel Signaling (CCS)
Signaling System Number (SS7) is a form
of Common Channel Signaling.
4. Channel Associated Signaling
(CAS)
Used for In-Band Signaling
Signaling is transmitted in the same
frequency band as used by voice.
Voice path is established when the call
setup is complete, using the same path that
the call setup signals used.
5. Common Channel Signaling
Out of Band signaling
Employs separate, dedicated path for signaling.
Voice trunks are used only when a connection is
established, not before.
Faster Call Setup.
Voice Trunks
Switch Switch
A B
Signaling Link
6. Advantage of CCS over CAS
Faster call setup
No interference between signaling tones by
network and frequency of human speech pattern.
Greater Trunking Efficiency:- CCS has shorter
call set up and tear down times that result in less
call holding time, thereby reducing the traffic on
the network.
Information Transfer:- CCS allows the transfer of
additional information along with the signaling
traffic providing facilities such as caller
identification and voice or data identification
7. SS7 History
CCITT developed a digital signaling standard
called Signaling System 6
SS6 was based on Packet-Switched, proprietary
data network.
– Uses 2.4 Kbps data links to send packets of
data to distant switches to request service.
SS7 began deployment in 1983, was initially used
for inter office network, but now it is deployed in
local central offices.
Provide a global standard for call setup, routing,
control and database access.
8. SS7 Principle
Out of band Signaling
Higher Signaling data rates (56Kbps & 64 Kbps)
Signaling traffic is bursty and of short duration,
hence operates in connectionless mode using
packet switching
Variable length signal units with maximum size
limitation
Optimum use of bandwidth
Reliability and flexibility
10. Protocols
Message Transfer Part (MTP Level 1) Physical
Provides an interface to the actual physical channel over
which communication takes place
CCITT recommends 64Kbps transmission whereas ANSI
recommends 56 Kbps
11. Protocols
MTP Level 2 (Data Link)
Ensures accurate end-to-end transmission of a message
across a signaling link
Variable Length Packet Messages are defined here
Implements flow control, message sequence validation,
error checking and message retransmission
Monitor links and reports their status
Test links before allowing their use
Provides sequence numbers for outgoing messages
12. Protocols
MTP Level 3 (Network)
Message routing between signaling points in the SS7
network
Signaling network management that provides traffic, links
and routing management, as well as congestion (flow)
control
Re-routes traffic away from failed links and signaling
points, controls traffic when congestion occurs
13. Protocols
Signaling Connection Control Part (SCCP)
Provides connectionless and connection-oriented
network services
Provides global title translation (GTT) capabilities
above MTP level 3; translates numbers to DPCs
and subsystem numbers
Provides more detailed addressing information
than MTPs
Used as transport layer for TCAP (Transaction
capabilities applications part) based services
14. Protocols
Transaction Capabilities Applications Part (TCAP)
Exchange of non-circuit related data
– Between applications across the SS#7 network
– Using the SCCP service
Queries and responses sent between Signaling Switching Point
(SSPs) and Signaling Control Point (SCPs)
Sends and receives database information
– Credit card validation
– Routing information
15. Protocols
Telephone User Part (TUP)
Basic call setup and tear down
In many countries, ISUP has replaced TUP for call
management
ISDN User Part (ISUP)
Necessary messaging for setup and tear down of
all circuits (voice and digital)
Messages are sent from a switch, to the switch
where the next circuit connection is required
Call circuits are identified using circuit
identification code (CIC)
18. Service switching point (SSP)
– SSPs are switches that have SS7 software and
terminating signaling links
– SSPs create packets (signal units) and send
those messages to other SSPs, as well as
queries to remote shared databases to find out
how to route calls
– SSPs communicate with the voice switch via
the use of primitives and have the ability to
send messages using ISUP (call setup and
teardown) and TCAP (database lookup)
protocols.
– The switch can originate, terminate, or switch
calls
19. Signaling transfer point (STP)
–STPs are packet switches, and act like routers in the
SS7 network.
–Routes each incoming message to an outgoing
signaling link, based on routing information contained
in the SS#7 message and a pre-defined route table
–Does not offer termination services
–STPs are paired to ensure redundancy
There are three levels of STPs.
•National Signal Transfer Point
•International Signal Transfer Point
•Gateway Signal Transfer Point
20. STP Levels
SSP SSP
ITU-TS
INTERNATIONAL
STP
GATEWAY
STP
NATIONAL STP
ANSI
SSP SSP
21. National STP exists within the national network
Protocol converters often interconnect a National and an
International STP by converting from ANSI to ITU-TS.
International STP functions within an international network.
All nodes connecting to an International STP must use the ITU-
TS protocol standard.
Gateway STP converts signaling data from one protocol to
another.
Gateway STPs are often used as an access point to the
international network.
Depending on its location, the Gateway STP must be able to use
both the International and National protocol standards.
22. Service control point (SCP)
– An SCP is usually a computer used as a front end to a
database system.
– It is an interface to application-specific databases.
– The address of an SCP is a point code, and the address
of the database it interfaces with is a subsystem
number.
– The database is an application entity which is accessed
via the TCAP protocol.
– Databases that provides information necessary for
advanced call processing capabilities
– Accepts a query for information from a subsystem at
another node
– Used by STP to perform a function called global title
translation
23. Databases Accessible via SCP
Home Location Used in cellular networks to store
HLR Register subscriber information.
Local Number Allows people to change service
LNP Portability providers but keep their same
telephone number
Operation Support Associated with remote maintenance
OSS System center for monitoring and managing
SS7 and voice networks.
Visitor Location Used when a cell phone is not
VLR Register recognized by the mobile switching
center (MSC).
25. SS7 Link Types
A link (access) Connects signaling end point (SCP or SSP) to STP
B link (bridge) Connects an STP to another STP; typically, a quad
of B links interconnect peer (or primary) STPs
(STPs from a network connect to STPs of another
network)
C link (cross) Connects STPs performing identical functions,
forming a mated pair (for greater reliability)
D link Connects a secondary (local or regional) STP pair
(diagonal) to a primary (inter-network gateway) STP pair in a
quad-link configuration; the distinction between B
and D links is arbitrary
E link Connects an SSP to an alternate STP
(extended)
F link Connects two signaling end points (SSPs and SCPs)
(fully in the same local network
associated)
26. Addressing in SS7 Network
Point Codes are carried in signaling messages and
exchanged between signaling points to identify the
source and destination of each message (24 bit
address).
1 1 1
NETWORK CLUSTER MEMBER
IDENTITY IDENTITY IDENTITY
27. What goes over Signaling Link
Signaling information is passed over the
signaling link in form of messages, which are
called signaling units (SUs)
3 Types of SUs are:
Message signal units(MSUs)
Link status signal units(LSSUs)
Fill-in signal units(FISUs)
28. Signaling Units
Message signal unit (MSU)
Carries signaling associated with call setup & teardown,
database query and response and SS7 network input
1 1 1 1 1 8-272 1
FLAG BSN/ FSN/ Length Service Signaling Check
BIB FIB Indicator Info. octet Info. field sum
29. Service Information Octet
1 2 3 4 5 6 7 8
• Bit 1 - 4 Type of Information in Signaling
Information Field
• Bit 5 - 6 Whether Message is intended for National
or International Network
• Bit 7 - 8 To identify Message Priority
30. Signaling Information Field
8 – 272 Octets
The first portion of this field is routing label
Routing Label Identifies Message Originator,
Intended destination & Signaling Link Selected.
Routing Label is of 7 Octets
– Destination Point Code – 3 Octets
– Originating Point Code – 3 Octets
– Signaling Link Selection – 1 Octet
31. Signaling Units
Link status signaling units (LSSU)
– Inform the far end about the changes in status
of link
– Message length can be 1 or 2 bytes
1 1 1 1 1 or 2 1
FLAG BSN/ FSN/ Length Status Check
BIB FIB Indicator Field Sum
32. Signaling Units
Fill-In Signal Units (FISU)
– Fill the gaps between MSU and LSSU messages
– Sent only when the buffer is empty, to keep the
signaling link active
– Facilitate in constant monitoring of link quality.
1 1 1 1 1
FLAG BSN/ FSN/ Length Check
BIB FIB Indicator Sum
34. ISUP Messages
Initial address message (IAM): contains all necessary
information for a switch to establish a connection
Address complete message (ACM): acknowledge to
IAM; the required circuit is reserved and the “phone is
ringing” (ring back tone)
Answer message (ANM): occurs when the called party
picks up the phone
Release (REL): sent by the switch sensing that the
phone hung up
Release complete (RLC): each exchange that receives
REL, sends an RLC message back (this acknowledges
receipt of REL)
35. Applications
Prepaid Calling Unified Messaging
Local Number 800 / Free Phone
Portability (LNP) Services
Global Roaming Short Message
International Callback Service (SMS)
Virtual Office Tele-voting
Internet Call Waiting/ Location-based
Caller ID Services
Least Cost Routing Caller Ring Back
Toll Bypass Tone (CRBT)
36. Implementation of SS7 in GSM
radio network and switching Fixed partner networks
subsystem subsystem
MS MS
ISDN
PSTN
Um MSC
BTS Abis
BSC EIR
BTS
SS7
HLR
BTS VLR
BSC ISDN
BTS MSC
A PSTN
BSS IWF
PDN
37. SS7/IP Inter-working
IP offers an economical solution to challenges
created by high volume traffic at network edge.
Operators off load voice calls from PSTN to VoIP
networks because it is less costly to carry voice
traffic over IP network than over Switched circuit
network.
In VoIP network, digitized voice data is highly
compressed and carried in packets over IP
network, thereby efficiently utilizing the
bandwidth and increasing the number of voice
calls carried.
Saving realized in using VoIP network are passed
on to users in the form of lower cost.
38. Features of SS7 over IP
Flow Control
In-Sequence Delivery of Signaling Messages
within a single control stream
Identification of the originating and terminating
signaling points
Identification of voice circuits
Error detection, re-transmission and other error
correcting procedures.
Controls to avoid congestion on the internet.
Detection of status of peer entities.
Support for security mechanism.
39. Signaling in VoIP networks
VoIP Network carry SS7 over IP using protocols defined by
Signaling Transport (SIGTRAN) working group of the
Internet Engineering Task Force (IETF).
In IP telephony networks, signaling information is exchanged
between the following functional elements.
Media Gateway
Media Gateway Controller
Signaling Gateway.
41. Media Gateway- Terminates voice calls on Inter-switch
Trunks from the PSTN, compresses and packetizes the voice
data and delivers compress voice packet to the IP network.
For voice calls originating in an IP network, it performs these
functions in reverse order.
Media Gateway Controller- It handles the registration and
management of resources at Media Gateway(s), also knows as
Soft Switch.
Signaling Gateway- It provides Transparent interworking of
signaling between switched ckt. and IP network. It may
terminate SS7 signaling or translate and relay messages over
an IP network to a media gateway controller or another
signaling gateway.
42. SIGTRAN Protocol Stack Model
The SIGTRAN’s protocol
specify the means by which
SS7 messages can be reliably
transported over IP network.
The architecture identifies three
component
A standard IP
A common signaling transport
protocol for SS7 protocol layer
being carried.
An adaptation module to
emulate lower layers of the
protocol.
43. Stream Control Transmission
Protocol(SCTP)
Allows the reliable transfer of
signaling messages between
signaling end points in an IP
network
Allows signaling messages to
be independently ordered with
in multiple streams to ensure
in sequence delivery between
associated end points.
SIGTRAN recommends
SCTP rather than TCP/IP for
transmission of signaling
messages over IP networks as
TCP/IP does enforce Head-of-
line Blocking.
44. Transporting MTP over IP
ITU specified following requirements
– MTP Level 3 peer to peer procedure require response
time with in 0.5 – 1.2 sec.
– No more than 1 in 10 million messages will be lost due
to transport failure.
– No more than 1 in 10 billion messages will be delivered
out of sequence.
– No more than 1 in 10 billion messages will contain an
error.
– Availability of any signaling route set is 99.9998%.
– Message length is 272 Bytes for SS7 (MAXIMUM)
IETF SIGTRAN working group recommends 3 new
protocols: M2UA, M2PA and M3UA.
45. M2PA
M2PA:- MTP2 User Peer-to-
Peer Adaptation Layer
–Support the transport of SS7
MTP3 signaling messages over
IP using the services of SCTP
–Allows full MTP Level3
message handling and network
management capabilities
between any 2 SS7 nodes
communicating over IP
–Used b/w signaling gateway
& media gateway controller,
signaling gateway & IP
signaling point, 2 IP signaling
points.
46. M2UA
M2UA:- MTP2 User
Adaptation Layer
– Transports SS7 MTP
Level2 user messages over
IP using SCTP
– Provides services as MTP
Level2 provides to MTP
Level3
– Used between signaling
gateway and media
gateway controller.
47. M3UA
M3UA:- MTP 3 User
Adaptation Layer
– Transports SS7 MTP
Level3 user signaling
messages over IP using
SCTP
– Provides services as
MTP Level3 provides to
ISUP,TUP,SCCP
– Used between signaling
gateway and media
gateway controller or IP
telephony database
48. SUA
SUA: SCCP User
Adaptation Layer
– Transports SS7
SCCP User Part
Signaling Message
over IP using SCTP
– Used between
signaling gateway
and IP signaling end
point and between
IP signaling end
points.
49. Performance consideration &
Security Requirement for SS7/IP
SS7 over IP network must meet ITU standard and
user expectations, eg. ITU specifies end to end call
setup delay not more than 20-30 sec after IAM is
transmitted.
For transmission of signaling information over
internet, SIGTRAN recommends use of IPSEC,
which provides following security services
– Authentication
– Integrity
– Confidentiality
– Availability
50. Network Evolution to an All-IP
Network
Both traditional Circuit switch and IP based services need
to be supported by single network infrastructure
simultaneously.
Hybrid architecture may be the best solution.
Transition to All-IP network will not happen overnight.
IP Network