Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010158379 | TK5105.15 R87 2008 | Open Access Book | Book | Searching... |
Searching... | 30000010158362 | TK5105.15 R87 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Build and maintain a converged multimedia network environment
Seamlessly merge the Internet with cellular and wireless networks using next-generation IMS technology and the comprehensive information contained in this authoritative resource. The IP Multimedia Subsystem: Session Control and Other Network Operations details the steps necessary to deliver Web-based content, VoIP, streaming multimedia, conference calls, and text messages across one integrated network. Learn how to transition to IMS architecture, communicate with legacy networks, control sessions using SIP, and connect subscribers to network services. In-depth coverage of the latest IMS security, business intelligence, customer care, and billing procedures is also included.
Migrate legacy networks to IMS-based technologyUse the Proxy, Interrogating, and Serving Call Session Control Functions
Interface with TDM-based, wireless, wireline, and VoIP networks
Handle private and public user identities, domain names, and URLs
Establish SIP sessions and connect subscribers to network services
Deploy reliable network, access, and user-level security Prevent eavesdropping, DoS, message tampering, and amplification exploits Track services rendered and charge subscribers using DIAMETER and CDRs
Author Notes
Travis Russell is a senior manager in the Communications Software Solutions Group at Tekelec. He holds numerous patents and is the author of several books including Signaling System #?
Table of Contents
Foreword | p. ix |
Acknowledgments | p. xi |
Introduction | p. xiii |
Chapter 1 Architecture of the IMS | p. 1 |
IMS Concepts | p. 1 |
The Intelligent Network and Signaling System #7 | p. 3 |
Entities in an IMS Core Network | p. 10 |
Call Session Control Function (CSCF) | p. 10 |
IMS Reference Points | p. 22 |
Chapter 2 Moving from Legacy to Convergence | p. 27 |
Migrating the Backbone to an IP-Based Network | p. 28 |
Deploying VoIP as a Growth Strategy | p. 32 |
Deploying IMS | p. 33 |
Interworking Between the Legacy Network and IMS | p. 35 |
Migrating the OSS/BSS | p. 36 |
Interfacing to the IMS | p. 39 |
Circuit-Switched Domains (CS) | p. 40 |
Packet-Switched Domains (PS) | p. 48 |
VoIP Domain | p. 48 |
General Packet Radio Service (GPRS) | p. 51 |
UMTS and CDMA Domains | p. 52 |
From IMS to IMS | p. 54 |
Chapter 3 Session Initiation Protocol (SIP) | p. 57 |
SIP Protocol Structure | p. 58 |
SIP Methods | p. 60 |
SIP Requests | p. 64 |
SIP Responses | p. 65 |
SIP Header Fields | p. 69 |
Session Description Protocol (SDP) | p. 83 |
Session Level Description | p. 84 |
Time Description | p. 84 |
Media Description | p. 84 |
Media Attribute Lines (a=) | p. 85 |
Chapter 4 Addressing in the IMS | p. 87 |
Device Identity in the IMS | p. 89 |
SIP Identities in the IMS | p. 95 |
Domain Names and URIs | p. 96 |
User Identities | p. 99 |
Chapter 5 Establishing a Session in the IMS | p. 105 |
Accessing the Network | p. 106 |
Locating the P-CSCF | p. 107 |
Registration in the IMS Using SIP | p. 109 |
Basic Session Registration | p. 112 |
Interworking with the PSTN | p. 118 |
Interworking with VoIP | p. 127 |
Establishing Sessions in the IMS Using SIP | p. 127 |
Basic Session Establishment | p. 128 |
Emergency Session Establishment | p. 134 |
Modifying SIP Sessions in the IMS | p. 135 |
Terminating SIP Sessions in the IMS | p. 136 |
Chapter 6 Security Procedures in the IMS | p. 137 |
Security Threats in an IP Domain | p. 138 |
Eavesdropping | p. 139 |
Registration Hijacking | p. 139 |
Server Impersonation | p. 140 |
Message Body Tampering | p. 140 |
Session Teardown | p. 140 |
Denial-of-Service Attacks | p. 141 |
Amplification | p. 141 |
Securing the IMS | p. 142 |
Authentication & Authorization | p. 143 |
Confidentiality | p. 145 |
Denial of Service | p. 146 |
Integrity | p. 147 |
Privacy | p. 148 |
Non-Repudiation | p. 149 |
Access Security | p. 150 |
Encryption | p. 154 |
Authentication and Key Agreement | p. 155 |
Network Domain Security | p. 157 |
Chapter 7 Online and Offline Charging in the IMS | p. 161 |
Introduction to Charging | p. 162 |
Charging Architecture | p. 162 |
User Profile | p. 171 |
Accounting with DIAMETER | p. 173 |
Charging in the IMS | p. 175 |
Appendix A 3GPP Documentation | p. 201 |
IMS-Related Documentation | p. 201 |
IETF IMS-Related Documentation | p. 206 |
Appendix B Bibliography | p. 209 |
Index | p. 211 |