SMS that we send are stored in a SMSC and sent to the recipient thereafter.When the SMS is sent from the sender's phone, it is first stored in the SMSC. It is a store and forward method that is implemented in the SMSC.
If the recipient is unavailable at the moment, the SMSC should forward the message when he becomes available.If there is a cutoff period defined for the message, at that time the message will be removed from the SMSC.There is a flag to set whether the SMS Sender requires the delivery report or not.
Wednesday, January 19, 2011
Saturday, January 15, 2011
technological trends for 2011
Mobile computing is showing newer trends everyday.So whats in for 2011?
4G and WIMAX
4G is the fourth generation of cellular wireless standards.A 4G system is supposed to provide secure all-IP based mobile broadband solution to smartphones, laptop computer wireless modems and other mobile devices.
WIMAX is a telecommunications protocol that provides fixed and fully mobile Internet access.
Security is also another big issue which will come up.Just think of the phone you are using,it contains too much personal and business data, especially as you start relying on these smartphones.So this is one area which we can expect to see much more improvements in.
Mobile Advertising is expected to rapidly increase.Because the number of people accessing internet through mobile phones is expected to increase rapidly.
Looking at other technological trends,,, cloud computing heads the list.This is due to the low cost and the high expandability provided by cloud computing.
Context aware computing is another topic.Context aware computing means using the information collected from the environment to improve the interactions with the user.
The third wave of computing which is ubiquitous computing is an exciting new trend which is predicted to come live! It is about using computing technologies without being aware that we are using them.Computing will be integrated to the machines we use. With Ubiquitous computing, computing technologies will be able to be used like we use electricity today.
4G and WIMAX
4G is the fourth generation of cellular wireless standards.A 4G system is supposed to provide secure all-IP based mobile broadband solution to smartphones, laptop computer wireless modems and other mobile devices.
WIMAX is a telecommunications protocol that provides fixed and fully mobile Internet access.
Security is also another big issue which will come up.Just think of the phone you are using,it contains too much personal and business data, especially as you start relying on these smartphones.So this is one area which we can expect to see much more improvements in.
Mobile Advertising is expected to rapidly increase.Because the number of people accessing internet through mobile phones is expected to increase rapidly.
Looking at other technological trends,,, cloud computing heads the list.This is due to the low cost and the high expandability provided by cloud computing.
Context aware computing is another topic.Context aware computing means using the information collected from the environment to improve the interactions with the user.
The third wave of computing which is ubiquitous computing is an exciting new trend which is predicted to come live! It is about using computing technologies without being aware that we are using them.Computing will be integrated to the machines we use. With Ubiquitous computing, computing technologies will be able to be used like we use electricity today.
CDR - Call Detail Record
CDR is the computer generated record whenever an event occurs in a telephone exchange.
A CDR is made of fields that describes the exchange.
such fileds may include :
additional digits on the called number used to route or charge the call
the result of the call
the route by which the call entered the exchange
the route by which the call left the exchange
computer networks are widely used for transporting cdr files.
These details are later also used for billing purposes.The billing system also receives records from long distance service providers, roaming partners etc. The billing system then updates these CDRs to their correct customer and rating information. Then these details are combined into a single invoice that is sent to the customer.
Call detail records can be used later for reporting solutions as well because they hold a huge collection of information.
Three types of call detail records are,
- Fixed-fee CDRs — Generated when a subscriber logs into the SMS network and receives a password in the form of a text message. A fixed-fee CDR provides network access for a specified time period.
- Session CDRs — A session CDR records the length of time of the WLAN session and the number of bytes of data sent and received.
- Partial CDRs — Generated periodically during a WLAN session. A provider can specify how frequently a system generates a partial CDR by specifying time and volume.
A CDR is made of fields that describes the exchange.
such fileds may include :
additional digits on the called number used to route or charge the call
the result of the call
the route by which the call entered the exchange
the route by which the call left the exchange
computer networks are widely used for transporting cdr files.
These details are later also used for billing purposes.The billing system also receives records from long distance service providers, roaming partners etc. The billing system then updates these CDRs to their correct customer and rating information. Then these details are combined into a single invoice that is sent to the customer.
Call detail records can be used later for reporting solutions as well because they hold a huge collection of information.
Three types of call detail records are,
- Fixed-fee CDRs — Generated when a subscriber logs into the SMS network and receives a password in the form of a text message. A fixed-fee CDR provides network access for a specified time period.
- Session CDRs — A session CDR records the length of time of the WLAN session and the number of bytes of data sent and received.
- Partial CDRs — Generated periodically during a WLAN session. A provider can specify how frequently a system generates a partial CDR by specifying time and volume.
Saturday, January 8, 2011
Sigtran Stack
SIGTRAN , very briefly can be introduced as SS7 over IP.
SIGTRAN is a set of protocols that transport SS7 messages over IP networks. SIGTRAN allows IP networks to connect with the Public Switched Telephone Network (PSTN).SIGTRAN is a very IP friendly protocol suite.
A usage of SIGTRAN is when a telephone company switch transmits SS7 signals to a signaling gateway. The gateway converts the signals into SIGTRAN packets for transmission over IP to the next signaling gateway to another PSTN.
There are mainly 3 components of the SIGTRAN protocol stack
-A standard IP layer.
-Stream Control Transmission Protocol (SCTP):Operates same level as TCP.It helps to transfer messages between peer SCTP users.SIGTRAN uses few services of SCTP.
-An Adaptation layer
SIGTRAN currently defines four SS7 related adaptation layers as well.
-The message transfer part level 2 user adaptation (M2UA) layer
-The message transfer part level 2 peer-to-peer adaptation (M2PA) layer
-The message transfer part level 3 user adaptation (M3UA) layer
-The SS7 SCCP user adaptation (SUA) layer
SIGTRAN provides reliable and orderly transfer.There is low less and delay.SIGTRAN will play an important role in the future services as well.
SIGTRAN is a set of protocols that transport SS7 messages over IP networks. SIGTRAN allows IP networks to connect with the Public Switched Telephone Network (PSTN).SIGTRAN is a very IP friendly protocol suite.
A usage of SIGTRAN is when a telephone company switch transmits SS7 signals to a signaling gateway. The gateway converts the signals into SIGTRAN packets for transmission over IP to the next signaling gateway to another PSTN.
There are mainly 3 components of the SIGTRAN protocol stack
-A standard IP layer.
-Stream Control Transmission Protocol (SCTP):Operates same level as TCP.It helps to transfer messages between peer SCTP users.SIGTRAN uses few services of SCTP.
-An Adaptation layer
SIGTRAN currently defines four SS7 related adaptation layers as well.
-The message transfer part level 2 user adaptation (M2UA) layer
-The message transfer part level 2 peer-to-peer adaptation (M2PA) layer
-The message transfer part level 3 user adaptation (M3UA) layer
-The SS7 SCCP user adaptation (SUA) layer
SIGTRAN provides reliable and orderly transfer.There is low less and delay.SIGTRAN will play an important role in the future services as well.
Sunday, January 2, 2011
Operating System Clustering using SSI
Clustered computer systems have become an attractive solution for variable workloads.Hardware is available for these solutions but rendering the system usable from an operators' view point is an issue.Single computer operating systems do not scale in a usable manner to the clustered architecture.But some operating systems are designed specifically to support clustered architectures.
Before going on to clustered operating systems, any operating system system should provide a user friendly interface for the user, the applications and the cluster hardware.In a cluster operating system, when a node fails to function , the rest of the processes can continue to function. It is important to make sure that the cluster appears as a single computer.
Single system image (SSI) is used to do this.Implementing a single system image makes a cluster of machines appear as one computer.
A SSI implements the following features to a cluster.
- A single entry point to the cluster
user can connect to the cluster as a virtual host.The system
distributes the user requests to different physical hosts to
balance the load.
- A single file hierarchy
After entering a system, the user sees a single file system that
integrates local and global disks.
- A single control point
The entire cluster and each node can be configured, monitored and controlled
from a single window.
- virtual networking
any node can access any network connection.
- A single memory space
users see a huge memory which is actually a set of distributed memories.
- A single job management
a user job can be submitted from any node and any number of nodes can be requested
to execute it
- A single user interface
The user should be able to use the cluster through a single GUI.
Before going on to clustered operating systems, any operating system system should provide a user friendly interface for the user, the applications and the cluster hardware.In a cluster operating system, when a node fails to function , the rest of the processes can continue to function. It is important to make sure that the cluster appears as a single computer.
Single system image (SSI) is used to do this.Implementing a single system image makes a cluster of machines appear as one computer.
A SSI implements the following features to a cluster.
- A single entry point to the cluster
user can connect to the cluster as a virtual host.The system
distributes the user requests to different physical hosts to
balance the load.
- A single file hierarchy
After entering a system, the user sees a single file system that
integrates local and global disks.
- A single control point
The entire cluster and each node can be configured, monitored and controlled
from a single window.
- virtual networking
any node can access any network connection.
- A single memory space
users see a huge memory which is actually a set of distributed memories.
- A single job management
a user job can be submitted from any node and any number of nodes can be requested
to execute it
- A single user interface
The user should be able to use the cluster through a single GUI.
Subscribe to:
Posts (Atom)