C. Search lyrics of a song
Each search result, i.e. selected lyrics, would include a link to its demo song, so users could verify that. Of course, users could add that song in to their shopping cart as usual.
I am open for a full time job, remote job, or contract. Author: Vinh Nguyen; Email: canvinh@gmail.com
Date |
Revision |
Description |
Author |
2018-11-15 |
A |
Documents created with features in subsequent revisions |
Vinh Nguyen canvinh@gmail.com |
2020-09-10 |
PB1 |
Added section 35 for number portability used by Telco or subscriber relocation |
Vinh Nguyen |
2020-09-11 |
PB2 |
Update section 35 for an option to use subscriber credentials replacing PIN code |
Vinh Nguyen |
2021-07-12 |
PB3 |
Adding section 36 for handling of military mobile phone also registered as a VoIP phone |
Vinh Nguyen |
2022-04-05 |
PB4 |
Adding section 37 for handling phone calls using satellite networks |
Vinh Nguyen |
2022-12-23 |
PB5 |
Add some clarification in the section 37 |
Vinh Nguyen |
In order to provide 24/7 services to a base in case of interrupted
local central server, each RBS box would be configured to recognize the
military head quarter server as a backup server.
·
Military server would store all subscribers
of its forces in database. Those records would be active, but does not have any
activity or updated by local servers normally. That means local servers do not
need to update head quarter servers for daily activities of its subscribers.
·
Each RBS box would recognize the head quarter
server as a legitimate central server
·
The communication between an RBS box with
head quarter server would be common encryption, i.e. head quarter doesn’t need
to store private encryption used by each military base.
·
Usually each phone call setup would be
allowed within 1 minute. If a call could not be set up within a minute, system
would automatically disconnect all parties concerned to avoid hanging records
(zombie) in the system.
·
A local central server could be down for a
reason during a call request. If a call placed from an RBS could not be
completed within, e.g. 20 seconds, that RBS would attempt to connect with the
head quarter server to complete the call setup.
·
Head quarter server would set up call for
that user, and this is the only time the head quarter server stores data
related to that call for billing purposes.
·
If the local server was up after 20 seconds
and attempted to connect with that user’s RBS, the RBS should send a disconnect
message to the local central server to release its records. The call should be
handled by the head quarter server to simplify software implementation.
There should be only one backup system, i.e. head quarter server,
because military does not want head quarter data stored at any local base.
A subscription or features allocated to each user could be different in a local central server and its head quarter server for security and usage purpose. For example, a California user could surf Internet using satellite, but at its head quarter that user could not use Internet or only Internet via regular cable.
To make hacking activity harder, each military base would be
responsible to their private or local protocol encryption, i.e. head quarter
doesn’t know the over the air private encryption used by each base. Hacking
activity would likely be concentrated in head quarter; therefore this was a
risk of disposing over the air encryption’ security of local base, if hacked.
Hackers would be forced to come to each base and attempted to hack to the local
network.
To safeguard local over-the-air encryption, mobile phone would be
synchronized with new (daily or weekly change) encryption by placing its
handset into a personal cradle connected to local network.
Visitors to a base would be required to sync their handsets in an
IT control room to get local encryption in order to make or receive phone
calls.
Because protocol encryption could be easily implemented or
designed by many software developers, the tasks to track down the author or
obtaining the algorithms would be very difficult to hackers. Telephony system
providers could hand over this security task to each military force.
For Telco, they may offer both common over-the-air encryption and
private encryption to their subscribers downloaded over the air. Private
subscribers would communicate with the local RBS or RBS server using private
encryption. Visitors form another Telco would use common encryption, because
their phone numbers are identified as visiting roamers. The common encryption
could be updated by all Telco over the computer networks.
Usually a RAN is connected to an RBS and sending data to its
central RAN before dispatching to destination.
In this configuration the Internet communication from a handset
would go to the associated RBS server, where first packet of data would go the
central server to determine proper gateway to destination, such as Internet
Gateway, satellite gateway, WLAN gateway, etc. To make it compatible to 5G
system, those data packet would be encapsulated in an IP envelope (relevant
heading of those packets could be removed and then added later at destination
server) and send out toward its central RAN via selected gateway.
However the central server could add an indicator based on its
analysis of the packet’s destination, i.e. within IP telephony network, it
could remove the entire data packet heading or sending it directly to a central
server at destination. The proprietary IP protocol could be used. This is
optional for system developers as it is more complicated to develop, but
processing time for sending each packet to destination would be faster.
By the way for telco 5G stuff, APY is very powerful for using as a
platform of an RBS. The RAN could be incorporated into the APY to lower product
costs. With this the RBS could send data directly to its central RAN. It should
be faster and more efficient.
Figure 20. Subsystems handling of devices connected to handset via WiFi interface
As shown in the figure 20, there are two Wireless Envelope Final Packing and Unpacking subsystems
interfacing the wireless network for mobile telephony, i.e. one for military
system and one for regular Telco network.
Military handset used proprietary frequencies, so it cannot roam
in any regular Telco network. To make military handset roam-able, it must be
able to handle public air wave spectrums. To make military phone secured, each
handset should be loaded with separate mobile telephony system used by Telco,
i.e. Mobile Telephony Subsystem for Telco
Network. All phone calls using public airwaves would be handled by this
subsystem, i.e. military software is safeguarded or untouched.
The only issue would be handling of devices connecting to a
military handset via WiFi interface, i.e. handset acted as a mobile router. There
are 3 cases, i.e.
a) Military
staff using a military laptop to login its military network via the WiFi router.
This laptop should have a unique indicator recognized by the handset during exchanging
messages with the WiFi System Interface
Manager. Military staff is not recommended to use his “proprietary” laptop
using public wireless network. The less exposing of sensitive equipment to
public would be better in terms of security.
b) Public
laptops or tablets used by children or military staff to access public network
via military wireless system.
c) Public laptops or tablets used by children or military
staff to access public network via Telco wireless system.
In case of (a), all message exchanged by the military laptop would
be handled by the WiFi Packet Unpack and
Pack Unit for Military subsystem. This system would simply unpack packet
and preliminary pack data in required format before passing those to the WiFi System Interface Manager or Wireless Envelope Final Packing and
Unpacking for Military Network for final
processing including encryption and relevant packet envelope(s).
In case of (b), all message exchanged by the public laptop would
be handled by the WiFi Packet Unpack and
Pack Unit for Telco subsystem. This system would simply unpack packet and
preliminary pack data in required format before passing those to the WiFi System Interface Manager or System Interface Manager or Wireless Envelope Final Packing and
Unpacking for Military Network for final
processing including encryption and relevant packet envelope(s). (If you
wanted the WiFi Packet Unpack and Pack
Unit for Military subsystem to handle packing and unpacking tasks, the
system must know in advance that the handset is currently in military wireless
network, i.e. system is well integrated. By using Telco packing and unpacking
subsystem, the entire system is loosely coupled, WiFi Interface Unit only checks
for military indicator from a WiFi
message.)
In case of (c), all message exchanged by the any public laptop
would be handled by the WiFi Packet
Unpack and Pack Unit for Telco subsystem. This system would simply unpack
packet and preliminary pack data in required format before passing those to the
WiFi System Interface Manager or Wireless Envelope Final Packing and
Unpacking for Telco Network for final
processing including encryption and relevant packet envelope(s).
The above discussion is for dual mode mobile handsets using both
military and public wireless network, i.e. 2 WiFi Pack and Unpack Units running separately. If military decided
its handset is single mode, i.e. only used within military wireless network,
then only a WiFi Pack and Unpack Unit is needed.
By looking at the main diagram, we could see that communications
between servers or RBS Boxes could be Internet or satellites.
Satellites communications are generally expensive for heavily
usage.
Governments usually require network operators to provide Internet
or phone communications in rural areas in order to own airwave spectrum for
mobile telephony operations. Mobile operators could team up with an Internet
operator to run fiber optical cables in small cities or rural areas to provide
Internet services. Those locations could be connected to nearest larger city
for full services using fiber optical cables or satellites. RBS Boxes and radio
base stations could be installed in these remote locations to provide wireless
access or telephony. RBS Boxes would be connected together using Internet
lines. This would save both Internet Service Provider and Telco operators.
Military network (or police) network would cover the entire
country with Radio Base Stations (RBS). However their usage is very low, thus
Radio Base Station would be operated at very low processing power, i.e. under
usage.
Military could lease its RBS capacity, especially in rural areas,
to reliable Telco wireless operator(s). Telco would be responsible to sell its
services and handle communications to public users according to telecommunication
industry standards as well as providing a spectrum for RBS, i.e. each RBS
operates with 2 different spectrums in parallel; one for military (police) and
one for general public.
Military would load Telco’s telephony system on RBS to run it in
parallel with military telephony system. Note that military system has
different encryption and features for military users. There would be a
subcontract server handles public users in this case. Military would handle the
maintenance operations of this wireless network, and send monthly public user
information, billing information, etc. to Telco, i.e. a part of data stored in
the subcontract server.
Since military and police have policy to safeguard their networks
to outsiders, having part of networks leased would make them think twice. To
make their policy less impacted, public (leased) call’s traffic must be routed to
the nearest gateway to public network or as soon as possible, i.e. having less
public traffic in internal network. It should be noted that military and police
has extra network capacity, thus they would likely help residents in rural
areas with mobile telephony access via leasing its RBS and partial network to a
Telco operator.
Let’s MS-A be the calling party and MS-B be the called party. MS-A
and MS-B could be either a military (police) staff or a public user. We are
concerned with the calling party phone number, because it would determine call
traffic originated by a public user. By browsing call setup traffic’s diagrams
in sections above, MS-A and MS-B were included in the sequence of messages.
Therefore the mobile telephony network could redirect all calls involved public
user based on MS-A to nearest public network via a gateway.
MS-B is irrelevant in this case as a military (police) staff could
call to an internal colleague or a public user, where calls would be routed via
military’s (police’s) network to the nearest gateway closed to the called
party, MS-B.
To automate the process of a subscriber moving from a city to
another city or changing telecom operators easily, telecom operator should
assign a PIN code, which should include digits and alphabets, associated with
the phone number. For example,
If a subscriber registered with Bell Canada in Quebec, Bell would
give subscriber a phone number, e.g. 514-678-3425, and a PIN code such as
BELLQC34526. The registration process was performed in the Subscriber Location
Server and its home central server (serving the phone user) would be updated
automatically by messages. The phone user should safe guard this PIN code.
Assuming the subscriber moved from Quebec to Toronto of Ontario and registered
with Rogers. Rogers would assign the subscriber with a Toronto phone number,
e.g. 416-786-9879, and another PIN code ROGERON2456. In the registration
process in the Rogers’ telephony system at their Subscriber Location Server
(SLS), the SLS would send a deregistration request to the SLS of Bell Canada in
Quebec for the subscriber including his old phone number (514-678-3425) and
associated PIN code (BELLQC34526). SLS in Quebec would update (or remove the
subscriber record in) its database and also update record of relevant home central
server automatically. This process would be automated with that confidential
PIN code.
The process of phone number portability would be performed when a
subscriber was switching from a telco to another telco in the same city or
area. It could be done with the same automatic process as described above for
subscriber’s relocation by using his confidential PIN code.
If a subscriber lost his PIN code, the operator must contact the
previous operator and carry out deregistration process manually.
The idea was using previous subscriber phone number as username
and his PIN code as password in automatic deregistration process.
There is a way to automate deregistration process if user lost his
previous PIN code. The password could be his full name or previous address
including postal code. It is up to telecom operators to select which
information was credible enough to replace the PIN code to automate
deregistration process.
Usually a RAN is connected to an RBS and sending data to its central RAN before dispatching to destination.
In this configuration the Internet communication from a handset would go to the associated RBS server, where first packet of data would go the central server to determine proper gateway to destination, such as Internet Gateway, satellite gateway, WLAN gateway, etc. To make it compatible to 5G system, those data packet would be encapsulated in an IP envelope (relevant heading of those packets could be removed and then added later at destination server) and send out toward its central RAN via selected gateway.
However the central server could add an indicator based on its analysis of the packet’s destination, i.e. within IP telephony network, it could remove the entire data packet heading or sending it directly to a central server at destination. The proprietary IP protocol could be used. This is optional for system developers as it is more complicated to develop, but processing time for sending each packet to destination would be faster.
By the way for telco 5G stuff, APY is very powerful for using as a platform of an RBS. The RAN could be incorporated into the APY to lower product costs. With this the RBS could send data directly to its central RAN. It should be faster and more efficient.
Figure 20. Subsystems handling of devices connected to handset via WiFi interface
As shown in the figure 20, there are two Wireless Envelope Final Packing and Unpacking subsystems interfacing the wireless network for mobile telephony, i.e. one for military system and one for regular Telco network.
Military handset used proprietary frequencies, so it cannot roam in any regular Telco network. To make military handset roam-able, it must be able to handle public air wave spectrums. To make military phone secured, each handset should be loaded with separate mobile telephony system used by Telco, i.e. Mobile Telephony Subsystem for Telco Network. All phone calls using public airwaves would be handled by this subsystem, i.e. military software is safeguarded or untouched.
The only issue would be handling of devices connecting to a military handset via WiFi interface, i.e. handset acted as a mobile router. There are 3 cases, i.e.
a) Military staff using a military laptop to login its military network via the WiFi router. This laptop should have a unique indicator recognized by the handset during exchanging messages with the WiFi System Interface Manager. Military staff is not recommended to use his “proprietary” laptop using public wireless network. The less exposing of sensitive equipment to public would be better in terms of security.
b) Public laptops or tablets used by children or military staff to access public network via military wireless system.
c) Public laptops or tablets used by children or military staff to access public network via Telco wireless system.
In case of (a), all message exchanged by the military laptop would be handled by the WiFi Packet Unpack and Pack Unit for Military subsystem. This system would simply unpack packet and preliminary pack data in required format before passing those to the WiFi System Interface Manager or Wireless Envelope Final Packing and Unpacking for Military Network for final processing including encryption and relevant packet envelope(s).
In case of (b), all message exchanged by the public laptop would be handled by the WiFi Packet Unpack and Pack Unit for Telco subsystem. This system would simply unpack packet and preliminary pack data in required format before passing those to the WiFi System Interface Manager or System Interface Manager or Wireless Envelope Final Packing and Unpacking for Military Network for final processing including encryption and relevant packet envelope(s). (If you wanted the WiFi Packet Unpack and Pack Unit for Military subsystem to handle packing and unpacking tasks, the system must know in advance that the handset is currently in military wireless network, i.e. system is well integrated. By using Telco packing and unpacking subsystem, the entire system is loosely coupled, WiFi Interface Unit only checks for military indicator from a WiFi message.)
In case of (c), all message exchanged by the any public laptop would be handled by the WiFi Packet Unpack and Pack Unit for Telco subsystem. This system would simply unpack packet and preliminary pack data in required format before passing those to the WiFi System Interface Manager or Wireless Envelope Final Packing and Unpacking for Telco Network for final processing including encryption and relevant packet envelope(s).
The above discussion is for dual mode mobile handsets using both military and public wireless network, i.e. 2 WiFi Pack and Unpack Units running separately. If military decided its handset is single mode, i.e. only used within military wireless network, then only a WiFi Pack and Unpack Unit is needed.
By looking at the main diagram, we could see that communications between servers or RBS Boxes could be Internet or satellites.
Satellites communications are generally expensive for heavily usage.
Governments usually require network operators to provide Internet or phone communications in rural areas in order to own airwave spectrum for mobile telephony operations. Mobile operators could team up with an Internet operator to run fiber optical cables in small cities or rural areas to provide Internet services. Those locations could be connected to nearest larger city for full services using fiber optical cables or satellites. RBS Boxes and radio base stations could be installed in these remote locations to provide wireless access or telephony. RBS Boxes would be connected together using Internet lines. This would save both Internet Service Provider and Telco operators.
Military network (or police) network would cover the entire country with Radio Base Stations (RBS). However their usage is very low, thus Radio Base Station would be operated at very low processing power, i.e. under usage.
Military could lease its RBS capacity, especially in rural areas, to reliable Telco wireless operator(s). Telco would be responsible to sell its services and handle communications to public users according to telecommunication industry standards as well as providing a spectrum for RBS, i.e. each RBS operates with 2 different spectrums in parallel; one for military (police) and one for general public.
Military would load Telco’s telephony system on RBS to run it in parallel with military telephony system. Note that military system has different encryption and features for military users. There would be a subcontract server handles public users in this case. Military would handle the maintenance operations of this wireless network, and send monthly public user information, billing information, etc. to Telco, i.e. a part of data stored in the subcontract server.
Since military and police have policy to safeguard their networks to outsiders, having part of networks leased would make them think twice. To make their policy less impacted, public (leased) call’s traffic must be routed to the nearest gateway to public network or as soon as possible, i.e. having less public traffic in internal network. It should be noted that military and police has extra network capacity, thus they would likely help residents in rural areas with mobile telephony access via leasing its RBS and partial network to a Telco operator.
Let’s MS-A be the calling party and MS-B be the called party. MS-A and MS-B could be either a military (police) staff or a public user. We are concerned with the calling party phone number, because it would determine call traffic originated by a public user. By browsing call setup traffic’s diagrams in sections above, MS-A and MS-B were included in the sequence of messages. Therefore the mobile telephony network could redirect all calls involved public user based on MS-A to nearest public network via a gateway.
MS-B is irrelevant in this case as a military (police) staff could call to an internal colleague or a public user, where calls would be routed via military’s (police’s) network to the nearest gateway closed to the called party, MS-B.
To automate the process of a subscriber moving from a city to another city or changing telecom operators easily, telecom operator should assign a PIN code, which should include digits and alphabets, associated with the phone number. For example,
If a subscriber registered with Bell Canada in Quebec, Bell would give subscriber a phone number, e.g. 514-678-3425, and a PIN code such as BELLQC34526. The registration process was performed in the Subscriber Location Server and its home central server (serving the phone user) would be updated automatically by messages. The phone user should safe guard this PIN code. Assuming the subscriber moved from Quebec to Toronto of Ontario and registered with Rogers. Rogers would assign the subscriber with a Toronto phone number, e.g. 416-786-9879, and another PIN code ROGERON2456. In the registration process in the Rogers’ telephony system at their Subscriber Location Server (SLS), the SLS would send a deregistration request to the SLS of Bell Canada in Quebec for the subscriber including his old phone number (514-678-3425) and associated PIN code (BELLQC34526). SLS in Quebec would update (or remove the subscriber record in) its database and also update record of relevant home central server automatically. This process would be automated with that confidential PIN code.
The process of phone number portability would be performed when a subscriber was switching from a telco to another telco in the same city or area. It could be done with the same automatic process as described above for subscriber’s relocation by using his confidential PIN code.
If a subscriber lost his PIN code, the operator must contact the previous operator and carry out deregistration process manually.
The idea was using previous subscriber phone number as username and his PIN code as password in automatic deregistration process.
There is a way to automate deregistration process if user lost his previous PIN code. The password could be his full name or previous address including postal code. It is up to telecom operators to select which information was credible enough to replace the PIN code to automate deregistration process.
During the early days of deployment this mobile telephony system for military and police, 5G phones could only be supported by a military frequency, and military didn’t want it roaming to a telco networks as well as signaling used in military’s mobile telephone network different than telco, i.e. proprietary IP signaling and private encryption.
In order to make phones used or recognized by worldwide telecom networks, each military phone could be registered as a VoIP phone. All incoming calls routed to its central home server, where call processing would be started as for a mobile phone within military network. This was the simplest and fastest way to make system up and running quickly.
To make its mobile phone able to roam to a public telecom network in addition to install a public mobile system on the phone in parallel with military mobile system, there are 2 solutions
· Each mobile phone would be registered as a mobile phone instead of VoIP phone
This solution may require additional work to update phone worldwide telco’s database. Telco system must recognize a home central server as an HLR and support IP communication, i.e. installing an IP node to convert IP signals or messages into their existing SS7 or C7 messages OR
· Updating telco’s MSC to recognize a mobile phone could be functioned as both VoIP phone and mobile phone, so routing, paging, and charging functions could be carried out properly.
Usually when we dialed a landline phone number, MSC would route call request through a voice trunk, e.g. BT4 or ISUP, without involving the process of authenticating, locating, paging, and routing call to a mobile phone.
If a dual mode phone roamed to a public network and dial a number, the MSC would send a request to its (IP) home central server for authentication and authorization instead to its “home HLR” via SS7 signaling. The home central server would behave as either landline MSC or home HLR depending on the state or location of its mobile phone.
Military must install a gateway node to convert SS7 messages into IP messages for processing OR each telco would convert SS7 message into IP messages before sending out via Internet.
If telecom operators planned to deploy or use this IP mobile telephony system, they should implement nodes to convert SS7 or C7 messages in IP messages to communicate to military networks.
This telephony system could be used for users in remote areas with satellite networks dispatching phone calls to a designated central server.
In scenario 1: assuming that an African user in a remote village places a phone call with local telecom operator to a user in California,
· The serving satellite operator (e.g. Telesat) doesn’t have any satellite in California or USA, but has a special agreement with Bell Mobility (wireless telco in Canada) and satellite in Canada.
· Call would be routed by satellite to Canada and connected to Bell Mobility network or central server
· Bell Mobility would route this call to the user in California by its network as usual
· The only draw back in this solution is “charging.” This (probably poor) user should be charge a “low” roaming fees.
· This call may be required by regulator to label as call routed by both satellite and mobile telephony networks.
· With African phone number, an indicator of Telesat, and Bell Mobility’s sender IP, we could tell the identity and how call was transferred.
In scenario 2: assuming passengers of a cross nationwide train wanted to place calls and surfing Internet on board. Usually they’re using GSM-R system for this, but we could also use this telephony system. Assuming passengers are travelling from Nova Scotia (Eastern Canada) to Vancouver of British Columbia (Western Canada).
· Equipping the train wagons with sufficient capacity for passengers by using RBS and its RBS box.
· The train could use Nova Scotia’s central server as its home servers and its passengers as roamers.
· Passengers could connect to the on-train RBS and is RBS box, which is communicated with satellite system such as Telesat during the journey.
· All calls or Internet traffic would be transferred back to the central server in Nova Scotia regardless of its location such as Quebec, Ontario, Manitoba, Alberta, etc.
· Calls and Internet traffics would be handled by central server in Nova Scotia.
· Similar as above arguments for call by African caller, calls and Internet usages must be charged with reasonable rates.
· And all traffics would be “labeled” as traffics by both satellite and land systems.
For cross-border trains from Canada to USA, the RBS box should still use Telesat satellite network in USA (or other satellite operator if they’re inter-connected) to communicate or relay communications back to Nova Scotia central server to complete call or Internet traffics with destination users. The reason for not using RBS box to communicate with a central server of another telecom operator in USA is “private” communications implemented between an RBS box and its dedicated central server. Satellites are considered as transport layers for on land telecom.
In case of roaming train originated in Canada to USA, where the original satellite operators (Telesat) doesn’t have satellites, the train could switch to the US satellite operator (previously in agreement) to handle call and Internet traffics for its passengers. If the US satellite operator doesn’t have satellites in Canada or inter-connected with Telesat, the passenger’s voice/data traffics would be routed to an on-ground ISP (in USA) operated by the US satellite network. This ISP would then route traffics toward the central server of that RBS box by using Internet for further processing, e.g. central server in Nova Scotia. Of course the central server in Nova Scotia would communicate with this ISP for handling traffics with its moving RBS Box via the US satellite network.
The main reason to beam down traffic to an ISP in USA, where it will be routed to the central server in Nova Scotia, was to use on the ground infrastructure. In general, satellite system belongs to military. Military would kick out everyone to take over the entire satellite system, if needed. Therefore having traffic on the ground would safeguard those communications.
Military communications could be hand-off between different satellite systems, if they wanted. However civil communications should avoid relying on satellite networks as much as you can for the reason above.