Cover image for The IMS : IP Multimedia Concepts and Services in the Mobile Domain.
The IMS : IP Multimedia Concepts and Services in the Mobile Domain.
Title:
The IMS : IP Multimedia Concepts and Services in the Mobile Domain.
Author:
Khartabil, Hisham.
ISBN:
9780470871140
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (449 pages)
Contents:
Contents -- Foreword -- Preface -- Acknowledgements -- List of Figures -- List of Tables -- PART I: ARCHITECTURE -- 1 Introduction -- 1.1 Why the Internet Protocol Multimedia Subsystem was developed -- 1.2 Where did it come from? -- 1.3 Other relevant standardization bodies -- 2 IP Multimedia Subsystem Architecture -- 2.1 Architectural requirements -- 2.2 Description of IMS-related entities and functionalities -- 2.3 IMS reference points -- 3 IMS Concepts -- 3.1 Overview -- 3.2 Registration -- 3.3 Session initiation -- 3.4 Identification -- 3.5 Identity modules -- 3.6 Security services in the IMS -- 3.7 Discovering the IMS entry point -- 3.8 S-CSCF assignment -- 3.9 Mechanism for controlling bearer traffic -- 3.10 Charging -- 3.11 User profile -- 3.12 Service provision -- 3.13 Connectivity between traditional Circuit-Switched users and IMS users -- 3.14 Mechanism to register multiple user identities at once -- 3.15 Sharing a single user identity between multiple terminals -- 3.16 SIP compression -- PART II: DETAILED PROCEDURES -- 4 Introduction -- 4.1 The example scenario -- 4.2 Base standards -- 5 An example IMS registration -- 5.1 Overview -- 5.2 Signalling PDP context establishment -- 5.3 P-CSCF discovery -- 5.4 Transport protocols -- 5.5 SIP registration and registration routing aspects -- 5.6 Authentication -- 5.7 Access security-IPsec SAs -- 5.8 SIP Security Mechanism Agreement -- 5.9 Compression negotiation -- 5.10 Access and location information -- 5.11 Charging-related information during registration -- 5.12 User identities -- 5.13 Re-registration and re-authentication -- 5.14 De-registration -- 6 An Example IMS Session -- 6.1 Overview -- 6.2 Caller and callee identities -- 6.3 Routing -- 6.4 Compression negotiation -- 6.5 Media negotiation -- 6.6 Resource reservation -- 6.7 Controlling the media.

6.8 Charging-related information for sessions -- 6.9 Release of a session -- 7 Routing of PSIs -- 7.1 Scenario 1: routing from a user to a PSI -- 7.2 Scenario 2: routing from a PSI to a user -- 7.3 Scenario 3: routing from a PSI to another PSI -- PART III: PROTOCOLS -- 8 SIP -- 8.1 Background -- 8.2 Design principles -- 8.3 SIP architecture -- 8.4 Message format -- 8.5 The SIP URI -- 8.6 The tel URI -- 8.7 SIP structure -- 8.8 Registration -- 8.9 Dialogs -- 8.10 Sessions -- 8.11 Security -- 8.12 Routing requests and responses -- 8.13 SIP extensions -- 9 SDP -- 9.1 SDP message contents -- 9.2 SDP message format -- 9.3 Selected SDP lines -- 10 The Offer/Answer Model with SDP -- 10.1 The offer -- 10.2 The answer -- 10.3 Offer/Answer processing -- 11 RTP -- 11.1 RTP for real-time data delivery -- 11.2 RTCP -- 11.3 RTP profile and payload format specifications -- 11.4 RTP profile and payload format specification for audio and video (RTP/AVP) -- 12 DNS -- 12.1 DNS resource records -- 12.2 The naming authority pointer (NAPTR) DNS RR -- 12.3 ENUM - the E.I64 to URI Dynamic Delegation Discovery System (DDD) application -- 12.4 Service records (SRVs) -- 13 GPRS -- 13.1 Overview -- 13.2 Packet Data Protocol (PDP) -- 13.3 Access points -- 13.4 PDP context types -- 14 TLS -- 14.1 Introduction -- 14.2 TLS Record Protocol -- 14.3 TLS Handshake Protocol -- 14.4 Summary -- 15 Diameter -- 15.1 Introduction -- 15.2 Protocol components -- 15.3 Message processing -- 15.4 Diameter clients and servers -- 15.5 Diameter agents -- 15.6 Message structure -- 15.7 Error handling -- 15.8 Diameter services -- 15.9 Specific Diameter applications used in 3GPP -- 15.10 Diameter SIP application -- 15.11 Diameter credit control application -- 15.12 Summary -- 16 MEGACO -- 16.1 Introduction -- 16.2 Connection model -- 16.3 Protocol operation -- 17 COPS -- 17.1 Introduction.

17.2 Message structure -- 17.3 COPS usage for policy provisioning (COPS-PR) -- 17.4 The PIB for the Go interface -- 17.5 Summary -- 18 IPsec -- 18.1 Introduction -- 18.2 Security associations -- 18.3 Internet Security Association and Key Management Protocol (ISAKMP) -- 18.4 Internet Key Exchange (IKE) -- 18.5 Encapsulated Security Payload (ESP) -- 18.6 Summary -- 19 Signalling Compression -- 19.1 SigComp architecture -- 19.2 Compartments -- 19.3 Compressing a SIP message in IMS -- 20 DHCPv6 -- 20.1 DHCP options -- 20.2 DHCP options for SIP servers -- 21 XCAP -- 21.1 XCAP application usage -- 22 CPCP -- PART IV: SERVICES -- 23 Presence -- 23.1 SIP for presence -- 23.2 Presence service architecture in IMS -- 23.3 Resource (presentity) list -- 23.4 XCAP usage for resource (presentity) lists -- 23.5 Setting presence authorization -- 23.6 Publishing presence -- 23.7 Watcher information event template package -- 23.8 Example signalling flows of presence service operation -- 24 Messaging -- 24.1 Overview of IMS messaging -- 24.2 IMS messaging architecture -- 24.3 Immediate messaging -- 24.4 Session-based messaging -- 24.5 Deferred delivery messaging -- 25 Conferencing -- 25.1 Conferencing architecture -- 25.2 SIP event package for conference state -- 25.3 Example signalling flows of conferencing service operation -- References -- Abbreviations -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X.
Abstract:
We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile telephony with the current technology has been hugely successful and shows that there is immense value in communicating with peers while being mobile, and with increasingly available smarter multimedia terminals the communication experience will be something more than just exchanging voice. Those multimedia terminals need IP multimedia networks. Hence, the Third Generation Partnership Project (3GPP) has developed a standard for SIP based IP multimedia service machinery known as 'The IMS (IP Multimedia Subsystem)' and this informative book explains everything you need to know about it……... Presents the architecture and functionality of logical elements of IMS and their interfaces providing detailed description of how elements are connected, what protocols are used and how they are used Explains how the optimisation and security of the mobile communication environment has been designed in the form of user authentication and authorisation based on mobile identities Illustrates how optimisation at the radio interface is achieved using specific rules at the user to network interface. This includes signalling compression mechanisms as well as security and policy control mechanisms, allowing radio loss and recovery detection Addresses important aspects from an operator's point of view while developing architecture such as charging framework, policy and service control Describes many services on top of IMS in detail, including voice, presence, messaging and conferencing. Written in a manner that allows readers to

choose the level of knowledge and understanding they need to gain about the IMS, this volume will have instant appeal to a wide audience ranging from marketing managers, research and development engineers, network engineers, developers, test engineers to university students.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: