The IMS: IP Multimedia Concepts and Services

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

It is a very good book on the next generation evolution of Telecom and that is IMS. This book has almost everything written on the concepts of IMS and it's evolution. Citing good examples with pictorial diagram and call flows.Which will definitely help a beginner to an experienced person to understand IMS.Well defined call flows,well defined architecture,well defined IMS interfaces and some of the latest features that can be implemented by following the concept of IMS are well written. But I think the price of this book is little at a higher side.That is the only thing. But still if you have a hunger to learn IMS,I think purchasing this book is worthy. Thanks, Debashis

Author(s): Miikka Poikselka, Georg Mayer
Edition: 3rd
Publisher: Wiley
Year: 2009

Language: English
Pages: 533

The IMS......Page 4
Contents......Page 8
Foreword......Page 18
Preface......Page 20
Acknowledgements......Page 22
List of Figures......Page 24
List of Tables......Page 30
Part I IMS Architecture and Concepts......Page 32
1.1 What is the Internet Protocol Multimedia Subsystem (IMS)?......Page 34
1.2 Fixed and Mobile Convergence......Page 36
1.3 Example of IMS Services......Page 38
1.4.1 3GPP Release 99 (3GPP R99)......Page 40
1.4.3 3GPP Releases 5 and 6......Page 41
1.4.4 IMS Development in other Standardization Development Organizations......Page 42
1.4.5 3GPP Release 7 and common IMS......Page 43
1.5 Why a SIP Solution Based on 3GPP Standards?......Page 44
2.1.1 IP Multimedia Sessions......Page 46
2.1.2 IP Connectivity......Page 47
2.1.4 IP Policy Control for Ensuring Correct Usage of Media Resources......Page 48
2.1.6 Charging Arrangements......Page 49
2.1.7 Support of Roaming......Page 50
2.1.9 Service Control Model......Page 51
2.1.10 Layered Design and Access Independence......Page 52
2.2 Description of IMS-related Entities and Functionalities......Page 53
2.2.1 Call Session Control Functions (CSCF)......Page 54
2.2.2 Emergency Call Session Control Function (E-CSCF)......Page 56
2.2.3 Databases......Page 57
2.2.4 Service Functions......Page 58
2.2.5 IMS-CS Interworking Functions......Page 60
2.2.6 Support Functions......Page 61
2.2.8 GPRS Entities......Page 63
2.3.1 Gm Reference Point......Page 64
2.3.2 Mw Reference Point......Page 65
2.3.5 Cx Reference Point......Page 66
2.3.6 Dx Reference Point......Page 69
2.3.7 Sh Reference Point......Page 70
2.3.9 Si Reference Point......Page 71
2.3.10 Mi Reference Point......Page 73
2.3.16 Mp Reference Point......Page 74
2.3.18 Gx Reference Point......Page 75
2.3.22 Ml Reference Point......Page 76
2.3.23 Ut Reference Point......Page 77
3.1 Overview......Page 78
3.2 Registration......Page 79
3.3 Mechanism to Register Multiple User Identities at a Go......Page 80
3.4 Session Initiation......Page 81
3.5.1 Public User Identity......Page 82
3.5.3 Relationship between Private and Public User Identities......Page 83
3.5.4 Identity Generation Without ISIM......Page 84
3.5.6 Identification of User’s Device......Page 86
3.5.7 Identification of Network Entities......Page 87
3.7 Sharing a Single User Identity between Multiple Devices......Page 88
3.8 Discovering the IMS Entry Point......Page 89
3.9 S-CSCF Assignment......Page 90
3.9.2 S-CSCF Assignment to Execute Services for an Unregistered User......Page 91
3.10.1 Introduction......Page 92
3.10.2 Gating and QoS Control......Page 94
3.10.4 Network Initiated Bearer Activation......Page 102
3.10.5 Usage of Rx Reference Point......Page 104
3.11.1 Introduction......Page 106
3.11.2 Charging Architecture......Page 107
3.11.3 Offline Charging......Page 108
3.11.4 Online Charging......Page 110
3.11.6 Charging Reference Points......Page 111
3.11.8 Charging Information Distribution......Page 116
3.12.1 Introduction......Page 117
3.12.2 Public Identification......Page 118
3.12.3 Core Network Service Authorization......Page 119
3.12.4 Service-Triggering Information......Page 120
3.13.1 Introduction......Page 121
3.13.2 Creation of Filter Criteria......Page 122
3.13.4 AS Behaviour......Page 124
3.14.2 IMS-Originated Session Toward a User in the CS Core Network......Page 125
3.14.3 CS-Originated Session Toward a User in IMS......Page 126
3.15 IMS Transit......Page 127
3.16 Support for Local Dialling Plans......Page 129
3.17.1 Introduction and Architecture......Page 131
3.17.3 Emergency Session Setup......Page 132
3.18.1 Introduction......Page 133
3.18.2 SigComp Architecture......Page 134
3.18.3 Compressing a SIP Message in IMS......Page 135
3.19.2 Capability Exchange......Page 136
3.20.1 Introduction......Page 138
3.20.3 Voice Call Continuity Session Initiation and Termination......Page 139
3.20.4 Voice Call Continuity Domain Transfer Procedure......Page 142
3.21 Security Services in the IMS......Page 144
3.21.2 Authentication......Page 145
3.21.3 Network Domain Security (NDS)......Page 149
3.21.4 IMS Access Security for SIP-Based Services......Page 152
3.21.5 IMS Access Security for HTTP-Based Services......Page 156
3.22.1 Introduction......Page 157
3.22.2 Network Address Translation......Page 158
3.22.3 IPv6-Only Versus Dual Stack......Page 163
3.22.7 Configuration and Bootstrapping......Page 164
3.22.8 IPv4-Only Access Networks......Page 165
PART II IMS Services......Page 168
4.1 Who will use the Presence Service?......Page 170
4.3 Presence Contributing to Business......Page 171
4.4 What is Presence?......Page 172
4.5 Presence Service in IMS......Page 173
4.6 Publishing Presence......Page 175
4.7 Subscribing Presence......Page 176
4.8 Watcher Information......Page 178
4.9 Setting Presence Authorization......Page 180
5 Group Management......Page 182
5.2 What is Group Management?......Page 183
5.4 What is Common Policy?......Page 184
5.4.1 Model and Rule Structure......Page 185
5.4.2 Data Types and Permission Processing......Page 186
5.6 XCAP Usage for Resource Lists......Page 187
5.7.1 Service Specific XML Document Management Servers......Page 190
5.7.2 Shared XML Document Management Servers......Page 199
5.8 Multimedia Telephony and Service Management......Page 202
5.8.3 Originating Identification Services......Page 203
5.8.5 Multimedia Telephony Service Management Example......Page 204
6 Push to Talk Over Cellular......Page 206
6.1 PoC Architecture......Page 207
6.1.1 PoC Server......Page 208
6.2.1 PoC Communication......Page 209
6.2.2 Simultaneous PoC Sessions......Page 211
6.2.3 PoC Session Establishment Models......Page 212
6.2.4 Incoming PoC Session Treatment......Page 214
6.2.5 Instant Personal Alerts......Page 217
6.2.6 Group Advertisement......Page 218
6.2.8 Participant Information......Page 219
6.3.1 Talk Bursts......Page 220
6.3.2 Talk Burst Control......Page 221
6.3.3 Quality Feedback......Page 222
6.4 PoC Service Settings......Page 223
7.2 Immediate Messaging......Page 226
7.3 Session-Based Messaging......Page 228
7.4 Messaging Interworking......Page 229
7.5 Instant Messaging by Open Mobile Alliance......Page 232
7.5.1 OMA IM Architecture......Page 233
7.5.2 IM Communication......Page 234
7.5.3 Conversation History......Page 242
7.5.4 Deferred Messaging......Page 244
7.5.5 IM Service Settings......Page 246
7.5.6 IM User-Plane......Page 248
7.5.7 Delivery Reports......Page 249
8.1.2 Conference Mixer–MRFP......Page 252
8.1.4 Conference Moderator, Floor Control and Conference Policy Control......Page 253
8.2.1 Conference Creation......Page 254
8.2.2 Joining a Conference......Page 257
8.2.3 Conference State Event Package......Page 259
8.2.4 Floor Control......Page 261
9.1 Introduction......Page 264
9.2.2 IMS Communication Service Identi.cation (ICSI) and Telephony Application Server (TAS)......Page 265
9.3.1 Communication Barring......Page 266
9.3.2 Communication Diversion......Page 267
9.3.3 Communication Hold......Page 269
9.3.4 Conference......Page 270
9.3.5 Message Waiting......Page 271
9.3.6 Originating Identification Presentation......Page 273
9.3.7 Originating Identification Restriction......Page 274
9.3.9 Terminating Identification Restriction (TIR)......Page 275
9.3.10 Explicit Communication Transfer......Page 276
PART III Detailed Procedures......Page 278
10.1 The Example Scenario......Page 280
10.2 Base Standards......Page 282
11.1 Overview......Page 284
11.2 Initial Parameters and IMS Management Object......Page 286
11.3 Signalling PDP Context Establishment......Page 287
11.4.1 Overview......Page 288
11.4.2 SIP and DNS Server Configuration via DCHPv6......Page 289
11.4.4 Transport Protocol Selection and DNS Service (SRV) Resolving......Page 290
11.5.1 Overview......Page 291
11.5.2 Constructing the REGISTER Request......Page 293
11.5.3 From the UE to the P-CSCF......Page 294
11.5.5 From the I-CSCF to the S-CSCF......Page 295
11.5.6 Registration at the S-CSCF......Page 297
11.5.7 The 200 (OK) Response......Page 299
11.5.8 The Service-Route Header......Page 300
11.5.9 The Path Header......Page 301
11.5.10 Third-Party Registration to Application Servers......Page 302
11.5.11 Updating the User Profile......Page 303
11.6.1 Overview......Page 304
11.6.3 Authentication Information in the Initial REGISTER Request......Page 306
11.6.4 S-CSCF Downloads the Authentication Vector (AV) from the HSS......Page 307
11.6.5 S-CSCF Challenges the UE......Page 308
11.6.6 UE’s Response to the Challenge......Page 309
11.7.1 Overview......Page 310
11.7.2 Establishing an SA During Initial Registration......Page 311
11.7.3 Handling of Multiple Sets of SAs in the Case of Re-authentication......Page 313
11.7.4 SA Lifetime......Page 315
11.7.5 Port Setting and Routing......Page 316
11.7.6 Related Standards......Page 319
11.8.2 Overview......Page 320
11.8.3 Sip-Sec-Agree-Related Headers in the Initial REGISTER Request......Page 321
11.8.4 The Security-Server Header in the 401 (Unauthorized) Response......Page 322
11.8.6 Sip-Sec-Agree and Re-Registration......Page 323
11.9.1 Overview......Page 325
11.9.3 IMS Communication Service Identification (ICSI) and IMS Application Reference Identification (IARI)......Page 326
11.10.1 Overview......Page 328
11.10.3 comp=SigComp Parameter During Registration......Page 329
11.10.4 comp=SigComp Parameter in Other Requests......Page 330
11.11.2 P-Visited-Network-ID......Page 331
11.13.1 Overview......Page 332
11.13.2 Public and Private User Identities for Registration......Page 333
11.13.4 Default Public User Identity/P-Associated-URI Header......Page 334
11.13.5 Assignment of a Globally Routable User Agent URI......Page 335
11.13.6 UE’s Subscription to Registration-State Information......Page 336
11.13.7 P-CSCF’s Subscription to Registration-State Information......Page 339
11.13.9 Registration-State Information in the Body of the NOTIFY Request......Page 340
11.13.10 Example Registration-State Information......Page 342
11.13.11 Multiple Terminals and Registration-State Information......Page 346
11.13.12 Related Standards......Page 347
11.14.2 Network-Initiated Re-Authentication......Page 348
11.14.3 Network-Initiated Re-Authentication Notification......Page 349
11.15.1 Overview......Page 350
11.15.2 User-Initiated De-Registration......Page 352
11.15.3 Network-Initiated De-Registration......Page 355
11.16.1 Example IMS Registration with Fallback to GIBA......Page 357
11.16.2 GIBA Scenarios......Page 360
12.1 Overview......Page 362
12.2.2 From and To Headers......Page 364
12.2.3 Identification of the Calling User: P-Preferred-Identity and P-Asserted-Identity......Page 365
12.2.4 Identification of the Called User......Page 366
12.3.1 Overview......Page 368
12.3.2 Session, Dialog, Transactions and Branch......Page 369
12.3.3 Routing of the INVITE Request......Page 371
12.3.4 Routing of the First Response......Page 376
12.3.6 Routing of Subsequent Requests in a Dialog......Page 378
12.3.8 Routing to and from ASs......Page 380
12.3.9 IMS Communication Service Identi.cation......Page 383
12.4.2 Compression of the Initial Request......Page 391
12.4.3 Compression of Responses......Page 392
12.5.1 Overview......Page 393
12.5.2 Reliability of Provisional Responses......Page 395
12.5.3 SDP Offer/Answer in IMS......Page 396
12.6.1 Overview......Page 404
12.6.3 Are Preconditions Mandatorily Supported?......Page 405
12.6.4 Preconditions......Page 407
12.6.5 Establishing the Media Resources and PCC Related Actions......Page 412
12.6.6 Media Policing......Page 413
12.7.1 Overview......Page 414
12.7.2 Inter-Operator Identi.er Exchange of ICID for a Media Session......Page 415
12.7.3 Correlation of GCID and ICID......Page 416
12.7.4 Distribution of Charging Function Addresses......Page 417
12.8.1 User-Initiated Session Release......Page 418
12.8.2 P-CSCF Performing Network-Initiated Session Release......Page 419
12.9.1 Overview......Page 420
12.9.2 Session with a Uni-Directional Media Stream and Available Resources on A Side......Page 421
12.9.3 Session with a Uni-Directional Media Stream and Resources Need to be Reserved on A and B Side......Page 426
12.9.4 Resources Available on B Side Only......Page 429
12.9.5 Network Initiated Resource Reservation, Resources Available Only at A-Side......Page 431
12.9.6 Network Initiated Resource Reservation at A Side......Page 435
12.9.7 Resources Available on A Side and B Side......Page 437
12.9.8 Early Media and Reliable Ring-Back Tone......Page 439
12.9.9 Session Towards a Non-IMS SIP Terminal......Page 441
12.9.10 Session From Non-IMS SIP Terminal......Page 445
12.10.1 Theresa Registers her Laptop......Page 446
12.10.2 REFER Request in Order to Transfer the Ongoing Call to Theresa’s Laptop......Page 447
12.10.3 Setting up the New Call to Theresa’s Laptop......Page 448
12.11.1 Scenario 1: Routing From a User to a PSI......Page 449
12.11.2 Scenario 2: Routing From a PSI to a User......Page 450
12.12.1 Overview......Page 451
12.12.2 Packet Data Protocol (PDP)......Page 452
12.12.3 PDP Context Types......Page 453
13.1 Overview......Page 456
13.2 Configuring the Clients with Communication Continuity Configuration Parameters......Page 458
13.3.2 Anchoring Decision and Routing the CS Call to the MGCF......Page 460
13.3.3 Interworking the CS Call to IMS at the MGCF......Page 462
13.3.4 Forwarding the IMS call to the VCC Application Server (resolving and direct routing of PSI)......Page 467
13.3.5 Anchoring the Call in Tobias’s Domain......Page 468
13.3.6 Forwarding the Call to Theresa’s Domain......Page 472
13.3.7 Anchoring the call in Theresa’s Domain......Page 478
13.3.8 Delivering the Call to Theresa......Page 483
13.3.9 Establishing the End-to-End Call......Page 484
13.3.10 Scenario After Anchoring......Page 487
13.4.1 Tobias’s Phone Invokes VCC Procedures......Page 488
13.4.2 Routing to Tobias’s VCC AS......Page 490
13.4.3 Tobias’s VCC AS Performs the CS to IMS Domain Transfer......Page 491
13.4.4 Scenario after CS to IMS Domain Transfer......Page 493
13.5 Theresa adds Video to the Call......Page 494
13.6.1 Theresa’s Phone Starts VCC Procedures......Page 496
13.6.3 Performing the IMS to CS Domain Transfer......Page 497
13.6.4 Scenario after IMS to CS Domain Transfer......Page 498
13.7 Related Standards......Page 499
References......Page 502
List of Abbreviations......Page 508
Index......Page 518