Our High-Performing Core Network

Fully virtualizable on VMware, K8S, Docker and OpenStack containers

Voice over LTE(VoLTE)

VoLTE (Voice over LTE) is a voice service based on IP Multimedia Subsystem(IMS). It is an IP data transmission technology that does not require 2G/3G network and all services are carried on 4G network, which can realize the unification of data and voice services under the same network.

Key Benefits

380cf5e734

100% cloud implementation of IMS core deployment

380cf5e734

Convergence of mobile and fixed access networks

380cf5e734

Deliver seamless, uninterrupted roaming

380cf5e734

Support hypervisor and dynamic lightweight Linux Containers

380cf5e734

Simplify managing interconnect network topology

380cf5e734

Carrier Grade Reliability Support for multimedia services

IPLOOK's vIMS solution Enable Voice over LTE(VoLTE) Roaming

  • The flexible IPLOOK VoLTE Roaming solution supports a variety of inbound and outbound 4G voice roaming models that ensure a consistent and seamless user experience while roaming. It also helps grow ARPU and prevent the churn of high-value subscribers by expanding HD voice services beyond an operator’s own borders. TNS VoLTE Roaming and its supporting IMS core elements play a critical role in the evolution of voice from circuit switched to IP-based cellular networks in 4G and beyond.

Features

Comply to 3GPP R14 Standard

Application Servers

Interfaces

I/S/P-CSCF, BGCF, SBC, AS NE Functions

Scale to millions of subscribers per service

Enable the use of HD voice and EVS voice codecs, including transcoding, delivering a better quality of experience (QoE) for end-users compared to over-the-top (OTT) services

Provides SIP signaling control and media anchoring to ensure voice call continuity for calls that traverse LTE and 3G networks

Secures the network edge for user access and/or peer network interconnection with topology hiding, Internet Protocol Security encryption (IPSec), Transport Layer Security (TLS), Secure Real-Time Transport Protocol (SRTP) and intrusion protection such as from Distributed Denial of Service (DDoS) attack

Related Products