SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
1
Source: Rec. ITU-T E.164 (11/2010)
CC - Country Code for geographic area
NDC - National Destination Code
SN - Subscriber Number
N - Number of digits in the country code
2
3
4
An alternative model, often called "Private ENUM", is widely deployed. Private
ENUM uses the DNS Protocol, but not the public DNS Database. Instead, the
database either uses a private domain suffix/apex reserved for this purpose and
known to all participants, or is provided by local DNS servers which do not tie
into the public IANA-based tree, or more commonly both privacy tactics are used.
The Private ENUM DNS servers typically reside in a private or restricted IP
network, and are only accessible to specific clients. Such Private ENUM clients
are typically constrained to be ones owned and managed by the carrier,
Unlike Infrastructure ENUM, Private ENUM DNS database entries are not registered and
populated by the carrier-of-record for a given E.164 number. Instead, the private
database's administrator (the local carrier) directly provisions the entries for all E.164
numbers it cares about, based on various indirect information data sources, and sets the
entry URI values relative to their specific "view".
Source: draft-kaplan-enum-sip-routing-01
5
Step 1: To resolve TEL URL to SIP URL
The output of the First Well Known Rule for the ENUM Application is the E.164 number
minus all non-digit characters except for the +. In order to convert this to a unique key
in this Database the string is converted into a domain-name according to this algorithm:
1. Remove all characters with the exception of the digits. For example, the First Well
Known Rule produced the Key "+442079460148". This step would simply remove
the leading "+", producing "442079460148".
2. Put dots (".") between each digit. Example 4.4.2.0.7.9.4.6.0.1.4.8
3. Reverse the order of the digits. Example: 8.4.1.0.6.4.9.7.0.2.4.4
4. Append the string ".e164.arpa" to the end. Example:
8.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. This domain-name is used to request NAPTR
records which may contain the end result.
If the query success, the response of ENUM server shall return:
$ORIGIN 3.8.0.0.6.9.2.3.6.1.4.4.e164.arpa.
NAPTR 10 100 "u" "E2U+sip" "!^.*$!sip:info@domainB!"
This describes that the domain 3.8.0.0.6.9.2.3.6.1.4.4.e164.arpa. is preferably contacted
by SIP
Step 2: From the SIP URL, resolve the domain name into IP address
The ENUM/DNS translation mechanism as specified in IETF RFC 3761 [16] can be used by all IMS
nodes that require E.164 address to SIP URI resolution.
The S-CSCF shall support the ability to translate the E.164 address contained in a Request-URI in
the Tel: URI format (as specified in IETF RFC 3966 [15]) to a SIP routable SIP URI using the
ENUM/DNS translation mechanism.
If this translation succeeds, then the session shall be routed according to the returned SIP URI.
6
If this translation fails, then the session may be forwarded to a BGCF for further
routing (e.g. to the PSTN).
Based on local configuration, the Breakout Gateway Control Function (BGCF) may
be provisioned as the contact point within an operator's network for transit IMS
scenarios. Otherwise the BGCF processes requests for routing from an S-CSCF for
the case were the S-CSCF has determined that the session cannot be routed
using DNS or ENUM/DNS .
The BGCF determines the next hop for routing the SIP message. This
determination may be based on information received in the protocol,
administrative information, and/or database access. For PSTN terminations, the
BGCF determines the network in which PSTN/CS Domain breakout is to occur. If
the routing determination is such that the breakout is to occur in the same
network in which the BGCF is located, then the BGCF shall select a MGCF that will
be responsible for the interworking with the PSTN/CS Domain.
7
8

Más contenido relacionado

La actualidad más candente

VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
Amit Deshmukh
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
tharinduwije
 

La actualidad más candente (20)

VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
IMS Call Follow
IMS Call FollowIMS Call Follow
IMS Call Follow
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
190937694 csfb-call-flows
190937694 csfb-call-flows190937694 csfb-call-flows
190937694 csfb-call-flows
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
 
VoLTE KPI Performance
VoLTE KPI PerformanceVoLTE KPI Performance
VoLTE KPI Performance
 

Similar a IMS ENUM & DNS Mechanism

Complete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc studentsComplete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc students
sreejasethu1
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
S S
 

Similar a IMS ENUM & DNS Mechanism (20)

VoIP, Portability, and the Evolution of Addressing
VoIP, Portability, and the Evolution of AddressingVoIP, Portability, and the Evolution of Addressing
VoIP, Portability, and the Evolution of Addressing
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Complete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc studentsComplete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc students
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
ENUM Applications and Network at Work
ENUM Applications and Network at WorkENUM Applications and Network at Work
ENUM Applications and Network at Work
 
Application Layer
Application Layer Application Layer
Application Layer
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
TCP Model
TCP ModelTCP Model
TCP Model
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTWIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
Ch6-Network_Protocols.ppt
Ch6-Network_Protocols.pptCh6-Network_Protocols.ppt
Ch6-Network_Protocols.ppt
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Network commands
Network commandsNetwork commands
Network commands
 
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptxRHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
 

Más de Houman Sadeghi Kaji

Más de Houman Sadeghi Kaji (12)

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud Management
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
Ims naming identity
Ims naming identityIms naming identity
Ims naming identity
 
What is ims
What is imsWhat is ims
What is ims
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 

Último

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

IMS ENUM & DNS Mechanism

  • 1. 1
  • 2. Source: Rec. ITU-T E.164 (11/2010) CC - Country Code for geographic area NDC - National Destination Code SN - Subscriber Number N - Number of digits in the country code 2
  • 3. 3
  • 4. 4
  • 5. An alternative model, often called "Private ENUM", is widely deployed. Private ENUM uses the DNS Protocol, but not the public DNS Database. Instead, the database either uses a private domain suffix/apex reserved for this purpose and known to all participants, or is provided by local DNS servers which do not tie into the public IANA-based tree, or more commonly both privacy tactics are used. The Private ENUM DNS servers typically reside in a private or restricted IP network, and are only accessible to specific clients. Such Private ENUM clients are typically constrained to be ones owned and managed by the carrier, Unlike Infrastructure ENUM, Private ENUM DNS database entries are not registered and populated by the carrier-of-record for a given E.164 number. Instead, the private database's administrator (the local carrier) directly provisions the entries for all E.164 numbers it cares about, based on various indirect information data sources, and sets the entry URI values relative to their specific "view". Source: draft-kaplan-enum-sip-routing-01 5
  • 6. Step 1: To resolve TEL URL to SIP URL The output of the First Well Known Rule for the ENUM Application is the E.164 number minus all non-digit characters except for the +. In order to convert this to a unique key in this Database the string is converted into a domain-name according to this algorithm: 1. Remove all characters with the exception of the digits. For example, the First Well Known Rule produced the Key "+442079460148". This step would simply remove the leading "+", producing "442079460148". 2. Put dots (".") between each digit. Example 4.4.2.0.7.9.4.6.0.1.4.8 3. Reverse the order of the digits. Example: 8.4.1.0.6.4.9.7.0.2.4.4 4. Append the string ".e164.arpa" to the end. Example: 8.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. This domain-name is used to request NAPTR records which may contain the end result. If the query success, the response of ENUM server shall return: $ORIGIN 3.8.0.0.6.9.2.3.6.1.4.4.e164.arpa. NAPTR 10 100 "u" "E2U+sip" "!^.*$!sip:info@domainB!" This describes that the domain 3.8.0.0.6.9.2.3.6.1.4.4.e164.arpa. is preferably contacted by SIP Step 2: From the SIP URL, resolve the domain name into IP address The ENUM/DNS translation mechanism as specified in IETF RFC 3761 [16] can be used by all IMS nodes that require E.164 address to SIP URI resolution. The S-CSCF shall support the ability to translate the E.164 address contained in a Request-URI in the Tel: URI format (as specified in IETF RFC 3966 [15]) to a SIP routable SIP URI using the ENUM/DNS translation mechanism. If this translation succeeds, then the session shall be routed according to the returned SIP URI. 6
  • 7. If this translation fails, then the session may be forwarded to a BGCF for further routing (e.g. to the PSTN). Based on local configuration, the Breakout Gateway Control Function (BGCF) may be provisioned as the contact point within an operator's network for transit IMS scenarios. Otherwise the BGCF processes requests for routing from an S-CSCF for the case were the S-CSCF has determined that the session cannot be routed using DNS or ENUM/DNS . The BGCF determines the next hop for routing the SIP message. This determination may be based on information received in the protocol, administrative information, and/or database access. For PSTN terminations, the BGCF determines the network in which PSTN/CS Domain breakout is to occur. If the routing determination is such that the breakout is to occur in the same network in which the BGCF is located, then the BGCF shall select a MGCF that will be responsible for the interworking with the PSTN/CS Domain. 7
  • 8. 8