As an example of our commitment to open systems and interfaces we released on late May 2016 the initial version of a Wireshark dissector targeting MCPTT protocols.
We developed a LUA based dissector that allowed decoding MCPTT messages simply by placing the dissector in the proper path, with no need to recompile Wireshar/tshark. More specifically it implemented MCPT, the RTCP APP based floor controlling mechanism.
Now, we enhance the dissector with eMBMS related protocols (MB2-C and MCCP).
Nemergent team wants to share with the community a useful tool for analyzing Mission Critical Push-To-Talk (MCPTT) communications designed by 3GPP.
Nemergent team is happy to announce the first release of its MCPTT Application Server, which integrates 3GPP R13 MCPTT suite of standards.
After a long time since its birth and promising rise, IMS seemed to be a dead technology, buried due to the success of mass market proprietary alternatives for VoIP and Instant Messaging.
However, out of the sudden, VoLTE, MCPTT and IMS based eCALL seem to have brought undead IMS back to Life in citizens-to-authorities, first responders and eCALL relevant areas.
Mission critical communications standardization process began in early 2015 with the creation of SA WG6 – Mission Critical Applications. Initially this working group has been focused on the definition of the functional architecture and the information flows of Mission Critical Push-To-Talk (i.e. MCPTT). About a year later 3GPP practically finished the standardization process and launched MCPTT Rel.13 after the SA#71 plenary meeting, which was held in Gothenburg in March 2016.
NEW: Interested in commercial MCPTT products and services? check Nemergent Solutions