Tag Archive for: solutions


Telecom Hot Billing

Telecom Billing is a process of collecting usage, aggregating it, applying required charges and finally generating invoices for the customers. Telecom Billing process also includes receiving and recording payments from the customers.

Sending voice, data, picture, fax, etc., from one point to another using electronic media is termed as telecommunication and in short ‘telecom‘. Examples include Phone, Radio, Television and Internet. The medium of transmission includes Wire (Copper), Fiber Optics, Ether (wireless), Radio towers, Microwave, Satellite, etc.

Let us also list down a few basic telecom services being provided by various well known telecom operators −

  • Voice Call
  • Fax Service
  • SMS & MMS
  • Internet Connection
  • Data Download and Upload
  • Video Conferencing
  • IP based services, i.e., voice over IP or VPN

Billing systems are often viewed as accounts receivable, as the billing system assists in the collection (receipt) of money from customers. Billing systems are also part of accounts payable (for inter-carrier settlements), as customers often use services from other companies such as wireless roaming, long distance, and call completion through other networks.

After a call is made or you can say a usage is generated by the end customer, the mediation system gathers usage data from the network switch and builds a call-detail record (CDR). This CDR must contain ‘A’ party number and ‘B’ party number, the start and the end date & times.

The CDR is then stored until it can be rated. To rate the call, the CDR is examined to see if the call is, for example, an 800 number, a local call that is covered by a local-area calling plan, international call or a toll call. Information such as the time of the call was placed and city code or country codes are used to calculate the rate for the call.

Once each call is rated, this information is stored until the invoice is run, usually once a month. When the invoice is run, other nonusage charges, such as discounts or monthly fees, can be applied to the bill or sometime called invoice.

There could be a rating time discount or billing time discount, different payments done by the customers, different adjustments given, all these information contribute in the final invoice generation.

This information is then converted in a format, which can be printed in a readable form. Finally, the envelope is printed, stuffed with enclosures, and mailed to the end customer.

An event along with all its attributes is called Call Detail Record (CDR). A data collector in the network switch captures the usage in the form of Call Detail Record (CDR)/Usage Detail Record (UDR). These raw CDRs/UDRs are in turn converted by the mediation system into a format understandable by the Billing System.

There could be different network elements controlling the services and producing different types of CDRs; for example, for GSM telephony −

  • Voice calls are captured by the MSC (Mobile Switching Centre).
  • SMS traffic is captured by the SMSC.
  • Data traffic is captured by the GGSN.
  • MMS traffic is captured by the MMSC.
  • Roaming CDRs are captured by roaming partner’s switching element.

The following diagram shows the Network elements capturing Usage data and sending Raw UDRs to the Mediation System and finally to the Billing System for rating and billing.

As mentioned above, a CDR keeps usage details along with various other useful information. Below are the most important attributes of a CDR −

  • Calling Party (A number).
  • Called Party (B number).
  • Call Start (date and time).
  • How long the call was (duration).
  • Call Type (Voice, SMS, Data etc).
  • A unique sequence number identifying the record.

Additionally, a CDR may also record other information such as −

  • The identifier of the telephone exchange.
  • The result of the call (whether it was answered, busy, etc.).
  • Trunk or route used to connect the call.
  • Any fault condition encountered.
  • Indicators that note the use of features such as call forwarding, three-way calling, etc.
  • Any facilities used during the call, such as call waiting or call diversion.
  • Various other attributes depending on requirement.

The accurate recording of all required information in a UDR depends on the logic of the switch vendor plus the switch specific table entries. If either of these cannot record the data accurately, the mediation system will not be able to recognize the completed calls and pass them to the billing system.


Smart Conference Room

Lighting Management System

Data Center Access Control

Today’s data centers demand an increased level of physical security to comply with strict data protection regulations. Protecting assets within the data center is a crucial aspect of the overall security system, from perimeter security down to the rack level.

JOOBEEN’s data center solutions provide physical access control and monitoring at the rack level providing a complete, comprehensive physical security system.

Data Centres is a challenging domain, the success of which depends on security of client data. Most data centres store data of more than one organisation. It is very crucial for the data centre to prevent any unauthorised access of data. Joobeen offers a solution whereby data racks get secured biometrically with records of every access along with its duration. Only authorised person can get access of specific rack for the stipulated time using biometric verification.
Joobeen integrates access control solution with the generic process followed by every data centres.
Key Features:

  • Centralized Biometric Authentication
  • Pre-defined Rack Access
  • Rack accessible for a defined time period
  • Integration with video Surveillance

Underwater Speakers

One-time password

One-time Password

If you are using an untrusted public computer and need to access your LastPass data but are hesitant to do so because of potential keyloggers, LastPass provides One-Time Passwords (OTPs) as one option for securely accessing your account.

A one-time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid a number of shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has (such as a small keyring fob device with the OTP calculator built into it, or a smart card or specific cell phone) as well as something a person knows (such as a PIN).




Single sign-on

Single Sign-On


Managing facilities of electronic identities, Identification & Access Management (IAM) system is a framework for business processes. To enterprise security and regulatory compliance, Identification & Access Management is designed to support people centric approach.

Not only does IAM deliver role-based access to the right people at the right time, but also this enterprise system can find anomalies and security gaps. Therefore organization can proactively fix vulnerabilities and prevent malicious activities. Single sign-on is a subset of IAM concept.

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. The service authenticates the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session. On the back end, SSO is helpful for logging user activities as well as monitoring user accounts.



Unicast Restreamer

Software feature
  • Performance
    • High unicast stream capacity
    • Fault-detection and correction
  • Compatibility
    • Supports PC and IPTV devices
  • Restreamer capabilities
    • Protocol :TS over HTTP
    • Codec support: MPEG2,H264, MP3, AAC
    • PSI (PAT and PMT) detection and insertion: PSI packets are detected from input and transmitted as first packets in output; reduces start delay, decrease player malfunction
    • Big start buffer: player receives big initial buffer to fill its decoder buffer; instant display of the program after start of connection
    • Encoder-to-server redundancy
  • Authentication
    • Secure login
    • IP-based (Login-activated or fixed)
    • URL-encoded session-based (Login-activated)
  • Authorization
    • Time based access
    • Group based access
  • Accounting
    • User access info
    • Channel access info
  • Management & Monitoring
    • Telnet for management
    • SNMP monitoring & alerts
  • UI
    • Web-Based management system
    • Fully customizable User Interface
    • Easy configuration and operation
    • Configuration backup and restore
  • General Specification
    • Restreamer core is fully designed by Iranian expert.
    • Enhanced security by separated Ethernet for stream in and management
    • Out-stream Ethernet bonding

Live Gateway

Software features
  • Unicast Streaming
  • Protocol: TS over UDP / TS over RTP
  • Video/Audio Codec Support MPEG2,MPEG4,H.264,MP3,AAC
  • Malfunction detection and auto correction
  • Auto scanning for DVB-T and DVB-S channels
  • PID filtering
  • UI
    • Web-Based management system
    • Fully customizable User Interface
    • Easy configuration and operation
    • Configuration backup and restore
  • Management & Monitoring
    • Telnet for management
    • SNMP monitoring & alerts
  • Ethernet bonding
  • Multi DVB-S and DVB-T card support
Hardware requirement
  • CPU: Intel Core2 duo or better
  • At least 2 GB RAM
  • Industrial Main-Board
  • 4x high power PCI slot (provide 3 Amps per slot)
  • DVB-S and DVB-T card
  • Network: 1x Gigabit LAN

Nurse Calling System