Cover image for The IP multimedia subsystem (IMS) : session control and other network operations
Title:
The IP multimedia subsystem (IMS) : session control and other network operations
Personal Author:
Series:
McGraw-Hill communications
Publication Information:
New York, NY : McGraw-Hill, 2008
ISBN:
9780071488532

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010158379 TK5105.15 R87 2008 Open Access Book Book
Searching...
Searching...
30000010158362 TK5105.15 R87 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Build and maintain a converged multimedia network environment

Seamlessly merge the Internet with cellular and wireless networks using next-generation IMS technology and the comprehensive information contained in this authoritative resource. The IP Multimedia Subsystem: Session Control and Other Network Operations details the steps necessary to deliver Web-based content, VoIP, streaming multimedia, conference calls, and text messages across one integrated network. Learn how to transition to IMS architecture, communicate with legacy networks, control sessions using SIP, and connect subscribers to network services. In-depth coverage of the latest IMS security, business intelligence, customer care, and billing procedures is also included.

Migrate legacy networks to IMS-based technology

Use the Proxy, Interrogating, and Serving Call Session Control Functions

Interface with TDM-based, wireless, wireline, and VoIP networks

Handle private and public user identities, domain names, and URLs

Establish SIP sessions and connect subscribers to network services

Deploy reliable network, access, and user-level security Prevent eavesdropping, DoS, message tampering, and amplification exploits Track services rendered and charge subscribers using DIAMETER and CDRs


Author Notes

Travis Russell is a senior manager in the Communications Software Solutions Group at Tekelec. He holds numerous patents and is the author of several books including Signaling System #?


Table of Contents

Forewordp. ix
Acknowledgmentsp. xi
Introductionp. xiii
Chapter 1 Architecture of the IMSp. 1
IMS Conceptsp. 1
The Intelligent Network and Signaling System #7p. 3
Entities in an IMS Core Networkp. 10
Call Session Control Function (CSCF)p. 10
IMS Reference Pointsp. 22
Chapter 2 Moving from Legacy to Convergencep. 27
Migrating the Backbone to an IP-Based Networkp. 28
Deploying VoIP as a Growth Strategyp. 32
Deploying IMSp. 33
Interworking Between the Legacy Network and IMSp. 35
Migrating the OSS/BSSp. 36
Interfacing to the IMSp. 39
Circuit-Switched Domains (CS)p. 40
Packet-Switched Domains (PS)p. 48
VoIP Domainp. 48
General Packet Radio Service (GPRS)p. 51
UMTS and CDMA Domainsp. 52
From IMS to IMSp. 54
Chapter 3 Session Initiation Protocol (SIP)p. 57
SIP Protocol Structurep. 58
SIP Methodsp. 60
SIP Requestsp. 64
SIP Responsesp. 65
SIP Header Fieldsp. 69
Session Description Protocol (SDP)p. 83
Session Level Descriptionp. 84
Time Descriptionp. 84
Media Descriptionp. 84
Media Attribute Lines (a=)p. 85
Chapter 4 Addressing in the IMSp. 87
Device Identity in the IMSp. 89
SIP Identities in the IMSp. 95
Domain Names and URIsp. 96
User Identitiesp. 99
Chapter 5 Establishing a Session in the IMSp. 105
Accessing the Networkp. 106
Locating the P-CSCFp. 107
Registration in the IMS Using SIPp. 109
Basic Session Registrationp. 112
Interworking with the PSTNp. 118
Interworking with VoIPp. 127
Establishing Sessions in the IMS Using SIPp. 127
Basic Session Establishmentp. 128
Emergency Session Establishmentp. 134
Modifying SIP Sessions in the IMSp. 135
Terminating SIP Sessions in the IMSp. 136
Chapter 6 Security Procedures in the IMSp. 137
Security Threats in an IP Domainp. 138
Eavesdroppingp. 139
Registration Hijackingp. 139
Server Impersonationp. 140
Message Body Tamperingp. 140
Session Teardownp. 140
Denial-of-Service Attacksp. 141
Amplificationp. 141
Securing the IMSp. 142
Authentication & Authorizationp. 143
Confidentialityp. 145
Denial of Servicep. 146
Integrityp. 147
Privacyp. 148
Non-Repudiationp. 149
Access Securityp. 150
Encryptionp. 154
Authentication and Key Agreementp. 155
Network Domain Securityp. 157
Chapter 7 Online and Offline Charging in the IMSp. 161
Introduction to Chargingp. 162
Charging Architecturep. 162
User Profilep. 171
Accounting with DIAMETERp. 173
Charging in the IMSp. 175
Appendix A 3GPP Documentationp. 201
IMS-Related Documentationp. 201
IETF IMS-Related Documentationp. 206
Appendix B Bibliographyp. 209
Indexp. 211