Knowledge Base Archive

Complementing NFV Orchestrators with ManageIQ

While those on IT side of a CSP (Communications Service Provider) business are quite familiar with cloud management platforms such as ManageIQ, the network side folks are very familiar with NFV Orchestrators as defined in ETSI MANO spec. These two worlds are converging though and so are their technologies. We came across the presentation on [&hellip


XML XML Stands for eXtensible Markup Language. It is a textual data serialization format with a set of rules for encoding documents. There are many XML-based implementations today that include SOAP (Simple Object Access Protocol), RSS (Really Simple Syndication) etc. XML Example <note>Hi</note> XSD XSD stands for XML Schema Definition. It describes the elements in [&hellip

What is Cloud Computing ? Architecture companies security Google

Define Cloud Computing Cloud computing can be defined as a mechanism to access applications that actually reside at a location other than your computer.  As per definition it is most often another Internet-connected device in a distant data center. Under this paradigm another company hosts your applications rather than you doing it yourself. This means [&hellip

Web Services Security and Standards W3C OASIS WS-I

If you or your organization is involved in development of web services, it is very important to understand various threats to web services security and how to mitigate them. Analysis of Web Services Security should be integral part of any web development process. Web Services Security Attacks The attacks penetrating the Web Services Security can [&hellip

Message Oriented Middleware: QPID ActiveMQ RabbitMQ OpenAMQ ZeroMQ

Introduction to Message Oriented Middleware Message Oriented Middleware or MOM concept involves the exchange of data between different applications using messages. In a MOM,  messages are usually sent and received asynchronously (as compared to RPC-style communications which tend to be synchronous in nature). Using  this mechanism, applications are decoupled and senders and receivers exist without the [&hellip

WSDL Example Tutorial Test Sample SOAP Web Service WSDL

I had been looking for few WSDL examples that I could use as sample while creating my own WSDL for a web service. But I could not find an example that could meet my need completely. So, in this post we will look at various WSDL examples and then create one for a 3GPP notification [&hellip

Voice Over LTE tutorial: Features Approaches CSFB Volga MMTEL OTT

Introduction to Voice Over LTE You probably own a new 4G LTE smart phone like Driod, HTC thunderbolt, Goolge Nexus but do you realize that voice service on it might still be 3G. This Voice Over LTE tutorial explains various mechanisms used to deliver voice over LTE networks today and in future. LTE features that [&hellip

IMS tutorial examples for online charging

This IP Multimedia Subsystem or IMS tutorial explains the charging models and architecture for IMS based services with the help of examples. IMS tutorial for Charging Types The IMS  (IP Multimedia Subsystem) architecture supports both online and offline charging capabilities. Online charging quick tutorial Online charging is a charging process in which the charging information [&hellip

Core vs CPU vs Socket vs Chip vs Processor Difference Comparison

Since the advent of multi-core technology such as dual-cores and quad-cores there is confusion regarding what a microprocessor consists of and what is the correct terminology. Here we analyze and compare  core vs cpu vs socket vs chip vs processor to define what each of these components or term represent. Cores Since standard microprocessors are [&hellip

Policy Control charging and DPI : What are telcos deploying ?

Introduction to Policy in telecommunications industry Policy (as Standardized in 3GPP and other architectures) in Telecommunications stands for the creation and application of rules in real time that control: What, where, when and how subscribers can access content and applications online The way that specific applications are treated regardless of who is using them The [&hellip