Wednesday, August 31, 2011

Some Billing tutorial sites

Hi folks this post is exclusive about the sites posting the telecommunication billing information so that will be very useful to easily get more information about the telecomm domain. Some sites: http://www.billingworld.com/ http://www.billingoss.com/telecom-billing.htm

Thursday, August 11, 2011

Sendmail with attachment to multiple recepients i.e Mutiple TO Address

 #!/usr/bin/ksh

# Address used to be A@B.com,B@C.com,D@E.com
/usr/sbin/sendmail $EMAIL1,$EMAIL2,$EMAIL3 << END_MAIL
From:
To: $EMAIL1,$EMAIL2,$EMAIL3
Subject: HI

$MSG


Regards,

`uuencode ${DIR}/attachment.gz  changedfilename.gz 2>/dev/null`

END_MAIL

exit 0

Thursday, August 4, 2011

Hibernet tutorials

Hibernet tutorial for the beginners

Hibernet vedio tutorials
click here for Hibernet tutorial

CAMEL

Visit the below site for basic understanding of camel application
http://www.3g4g.co.uk/Tutorial/ZG/zg_camel.html

Tuesday, August 2, 2011

RFC

 RFC's : Go through the link published below.

1.FTP: http://www.ietf.org/rfc/rfc0959.txts


Friday, July 29, 2011

Send Email from Command line Using ssmtp in linux

SSmtp command line email configuration:

Excellent Video tutorial to send mail from command prompt using ssmtp in linux environment
http://www.youtube.com/watch?v=QT-6NbjqjDM

Sendmail configuration:

Follow the below steps:

The SMART_HOST macro allows you to specify the host that should relay all outgoing mail that you are unable to deliver directly, and the mail transport protocol to use to talk to it.

Open your configuration file:# vi /etc/mail/sendmail.mc

Append or modify macro that read as follows :define(`SMART_HOST',`smtp.net4india.com')Replace smtp.net4india.com with your actual smtp server address.

If line contains word, dnl remove the dnl word. Regenerate a new sendmail.cf config file with m4 command:# m4 /etc/mail/sendmail.mc > /etc/mail/sendmail.cf


Restart sendmail service:# /etc/init.d/sendmail restart





Ksh script for sending the mail with the attachment


i have written the script which is used to sql query and retrieve the values and generate the  .csv file and mail the .csv using senmail utility

#!/usr/bin/ksh

#### Set the Path################################
export ORACLE_HOME=/usr/lib/oracle/xe/app/oracle/product/10.2.0/server
export PATH=$PATH:$ORACLE_HOME/bin

###### N out report format####################
N_Report=N_`date +%y_%m_%d_%H_%M_%S`

##### sql report for n#########oracle Express edition SID=xe###############
sqlplus -s Username/password@SID<
SET FEEDBACK OFF;
SET ECHO OFF;
SET COLSEP '';
SET PAGESIZE 0;
SET LINESIZE 300;

-- header not needed
spool /home/usr/${N_Report}.csv

select * from tablename ;

spool off

commit;
quit;
!

Dir_N=/home/usr/${N_Report}.csv

(uuencode $Dir_N $N_Report.csv ; echo "N Report") | mail -s "N report" -t xyz@xyz.com

please post your comments if any one needs more clarity for the above.

Tuesday, June 21, 2011

Voip

Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

VOIP @ Wiki Click here

VOIP Official Provider Click here

Call logging

Call logging is the process of collecting phone call data, analysing this data, and then reporting on the telephone network's cost, performance, capacity and quality of service (QoS). It should not be confused with telephone tapping or call recording. The former refers to listening to calls, while the latter is about recording conversations.

Click Here Call Logging
Click HereDigital speech call loging

Online charging system

I hava found the great information regarding the online charging information ..
Wikipedia provides us the very basic infomation about types of charging functions.

Now here am posting the wiki link...Online charging information

Tuesday, May 31, 2011

Telecomm Mediation

Am sharing the basic telecomm mediation presentation which gives us the basic understanding
http://www.ziddu.com/download/15194857/MediatonPortal_21012011_BRBRAITT_JBP.ppt.html

LDAP UNDERSTANDING

The Lightweight Directory Access Protocol is an application protocol for reading and editing directories over an IP network. A directory in this sense is an organized set of records: for example, a telephone directory is an alphabetical list of persons and organizations with an address and phone number in each "record".

The latest version of LDAP is Version 3, which is specified in a series of Internet Engineering Task Force (IETF) Standard Track Requests for comments (RFCs) as detailed in RFC 4510.

Example of LDAP Search in the LDAP server directory.

how to perform searches on the LDAP database, using the following methods:

*The ldapsearch command-line tool.
* Applying filters in searches.

What is ldapsearch?

The ldapsearch utility is used to locate and retrieve directory entries. It opens a connection to the specified server using the specified distinguished name and password, and locates entries based on a specific search filter. The search can be performed on an individual entry, on an entry's immediate subentries or on an entire tree or subtree.

The command is located in the //shared/bin/ directory.Search results are returned in LDIF format.

Syntax
General

The most general syntax of the ldapsearch is as follows:

ldapsearch -h host -b basedn [options] filter [attributes]
Options


Optional parameters are a series of command line arguments. If any, they must be specified before the filter. Special characters in values are escaped using double quotes and backslashes. This is a list of the most commonly used options:

*-b: Specifies the starting point (a distinguished name) of the search. Can be omitted if the variable LDAP_BASEDN has been set to a base DN. Value should be provided enclosed in double quotes.
*-D: Specifies the distinguished name with which to authenticate to the server. Optional if anonymous access is supported. Must be a DN having authority to perform queries.
*-h: hostname or IP address of the directory server. Defaults to the local host.
*-l: Time limit to wait for completion of the request. Cannot exceed the time limit configured on the server side; defaults to 3600 seconds.
*-p: TCP port number, defaults to 389.
*-s: scope of the search, can be one of the following:
o base: search only the entry specified with the -b option or the one defined by the LDAP_BASEDN environment variable.
o one: search only the immediate children of the entry specified with the -b option. The actual entry itself is not searched.
o sub: search the entry specified with the -b option and all of its descendants. This is the default scope for a search.
*-w: password for authenticating the distinguished name specified with the -D option.
*-x: simple authentication is used instead of sasl.
*-z: maximum number of search results.

Optional search filters

Optional search filters take the form



An example would be mailhost=server1.
Optional attribute list

The scope of the search can be reduced by specifying space separated attributes. This list must appear after the search filter. If not specified, all attributes for which the distinguished name specified with the -D has access rights will be returned.
Examples
Return all entries

The "objectclass=*" attribute applies to all entries in the directory:

ldapsearch -h server1 -b "dc=example,dc=com" -s sub "objectclass=*"
Return only specified entries

This command returns the common name and user ID attributes on all entries in the people branch:

ldapsearch -h server1 -b "ou=people,dc=example,dc=com" [-x] "objectclass=*"

The output should be like this:

version: 2

#
# filter: objectclass=*
# requesting: cn uid
#

# People, example, com
dn: ou=People,dc=example,dc=com

# mmichiel, People, example, com
dn: uid=mmichiel,ou=People,dc=example,dc=com
uid: mmichiel
cn: Mieke Michiels

# jjansen, People, example, com
dn: uid=jjansen,ou=People,dc=example,dc=com
uid: jjansen
cn: Jan Jansen
<--output omitted-->

# search result
search: 2
result: 0 Success

# numResponses: 45
# numEntries: 44

Using a search filter

This is how you can look up all attributes for a particular person:

ldapsearch -h server1 -b "dc=example,dc=com" [-x] "cn=Mieke Michiels"

The following is a typical result for such a query:

version: 2

#
# filter: cn=Mieke Michiels
# requesting: ALL
#

# mmichiel, People, example, com
dn: uid=mmichiel,ou=People,dc=example,dc=com
objectClass: person
objectClass: organizationalPerson
objectClass: inetOrgPerson
objectClass: account
objectClass: top
objectClass: posixAccount
objectClass: shadowAccount
host: *
uid: mmichiel
givenName: Mieke
sn: Michiels
cn: Mieke Michiels
loginShell: /bin/bash
mail: mmichiel@example.com
gecos: Mieke Michiels
shadowMax: 30
shadowWarning: 7
shadowInactive: 2
physicalDeliveryOfficeName: hq
telephoneNumber: +32-16-666666
o: EXAMPLE.com
facsimileTelephoneNumber: +32-16-666666
l: Leuven
homeDirectory: /nethome/mmichiel
gidNumber: 533
uidNumber: 533
userPassword:: e2NyeXB0xSQxJ4lDRzF2Z0rMJHVKT6tBOThwYmN7RGQzbzJNQ3lXLzE=
shadowLastChange: 12233

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1

Thursday, April 28, 2011

Telecomm billing domain Tools

BSS BILLING TOOLS

BSCS ,Oracle,BRM,Geneva,Amdocs,Intec,singleview,Comverse


Mediation Tools

EMS,Openet,Oracle,Digital Route,Intec,Comptel

Revenue Assurance and Fraud Management

Subex,Connectiva,CVidya

CRM
Siebel,Microsoft CRM

Wednesday, April 13, 2011

IP NETWORK AND PROTOCOLS

TCP/IP Protocol Suite
Soft switching and VOIP
Understanding of MPLS and VPN Network
Troubleshooting and Designing of Advance MPLS and VPN Network
SIGTRAN Technology
IPv4 and IPv6 Protocols, Implementation
Understanding of Connection Oriented Network(SONET/SDH,ATM,MPLS,OPTICAL NETWORK)
Network Recovery and Protection of IP Technologies
IP Multimedia Sub System (IMS)
Session Initiation Protocol (SIP)
ATM and Frame Relay Technology
Simple Network Management Protocol (SNMP)
Network Management protocol for Wireless Sensor Network (WSNM

Telecomm billing Topics

Introduction

The Principle of Billing
CDRs
What about data?
Billing can be for:
Volume Billing
Always on
IP Billing
Mediation
Rating
Interconnect/Interadministration Billing
What makes a good Billing System?


Boundaries and Interfaces

Defining the major areas of Billing Support Systems (BSS)
The end-to-end generic billing process flow
Interfacing and co-dependant critical systems - marketing, finance, OSS, network management
Making a call and the key billing system information at the service provider, customer and account levels
How the levels are linked to support billing processes


The Service Order Process

Acquiring customers and gathering their information
Credit checking options
Data structures
Information security issues


Mediation and Event Processing

What is Mediation?
Carrier Challenges
Mediation Requirements and Features
Collection, Filtering and Consolidation
Presentation and Distribution
Return on Investment


Rating and Pricing

A Huge range of Options
Least Cost Routing
Tariffing Tables
CDR Formats
Options
Some CDR Record Formats
Different Rates for Different Customers
Guiding


Billing and Collection - Invoicing the customer

The Bill and the Engines
Convergent Billing
Convergence Models


Interconnect Introduction

What is interconnect?
Why interconnect matters


Fraud management

How Big a Problem is this?
Criminals are Lazy
Types of Fraud and Fixes
Don't Spend too Much
Checklist


Calling Cards

Calling Cards and Accounts
Cards and Batches
Life Cycles of Batches and Cards
Charging for Calling Card
ASRs, Redial Causes and Least Cost Routing


Premium Rate Dialling

Cheap International Calls
Ranges of Access Numbers
Example Operators, websites and charges


The IP Billing Chain

The Food Chain
Volume Billing and its Limitations


So what is this

Data Traffic
Connection Types
Layered Systems
IP Features
TCP
IP Routing
The Internet


Voice over IP

Why Voice over IP?
Patterns of Use
Voice and Data are Different
All the Protocols Needed
Billing Implications


IP Billing Components

Content or just Bytes
Example from ADSL
Problems and Mediation
Viewpoints
Online Trading Example
What could we charge for?
IP Security
IPDR
TOM
JAIN Initiative
Parlay


Mobile IP Billing

GSM & GPRS
The Basis of 3G
Tariffs
Roaming
Location-Based Services
Prepay
Charging Principles
Quality
CDRs
Conclusions to Ponder