【資料成文時(shí)間】:March 2006
【語言】:ENGLISH
【頁數(shù)】:439
【何人(公司)所著】:MiikkaPoikselka----Nokia,FinlandGeorgMayer--------Nokia,Finland
HishamKhartabil---Telio,NorwayAkiNiemi-------------Nokia,Finland
【文件格式】:PDF
【文件原名】:
Wiley The IMS IP Multimedia Concepts and Services 2nd Edition
【摘要或目錄】:
PART I IMS ARCHITECTURE AND CONCEPTS
1 Introduction 3
1.1 What is the Internet Protocol Multimedia Subsystem (IMS) 3
1.2 Example of IMS services 5
1.3 Where did it come from? 6
1.3.1 From GSM to 3GPP Release 7 6
1.3.2 3GPP Release 99 (3GPP R99) 6
1.3.3 3GPP Release 4 7
1.3.4 3GPP Releases 5, 6 and 7 8
2 IP Multimedia Subsystem architecture 11
2.1 Architectural requirements 11
2.1.1 IP multimedia sessions 11
2.1.2 IP connectivity 12
2.1.3 Ensuring quality of service for IP multimedia services 13
2.1.4 IP policy control for ensuring correct usage of media
resources 13
2.1.5 Secure communication 14
2.1.6 Charging arrangements 14
2.1.7 Support of roaming 15
2.1.8 Interworking with other networks 16
2.1.9 Service control model 17
2.1.10Servic e development 17
2.1.11 Layered design 17
2.1.12 Access independence 19
2.2 Description of IMS-related entities and functionalities 19
2.2.1 Call Session Control Functions (CSCF) 20
2.2.2 Databases 23
2.2.3 Service functions 24
2.2.4 Interworking functions 26
2.2.5 Support functions 27
2.2.6 Charging entities 28
2.2.7 GPRS entities 28
2.3 IMS reference points 28
2.3.1 Gm reference point 29
2.3.2 Mw reference point 30
2.3.3 IMS Service Control (ISC) reference point 30
2.3.4 Cx reference point 31
2.3.5 Dx reference point 34
2.3.6 Sh reference point 34
2.3.7 Si reference point 36
2.3.8 Dh reference point 36
2.3.9 Mm reference point 36
2.3.10Mg reference point 36
2.3.11 Mi reference point 36
2.3.12 Mj reference point 37
2.3.13 Mk reference point 37
2.3.14 Mn reference point 37
2.3.15 Ut reference point 37
2.3.16 Mr reference point 38
2.3.17 Mp reference point 38
2.3.18 Go reference point 38
2.3.19 Gq reference point 38
2.3.20Charging reference points 39
3 IMS concepts 43
3.1 Overview 43
3.2 Registration 43
3.3 Mechanism to register multiple user identities at a go 45
3.4 Session initiation 46
3.5 Identification 48
3.5.1 Identification of users 48
3.5.2 Identification of services (public service identities) 52
3.5.3 Identification of network entities 52
vi Contents
3.6 Identity modules 53
3.6.1 IP Multimedia Services Identity Module (ISIM) 53
3.6.2 Universal Subscriber Identity Module (USIM) 54
3.7 Sharing a single user identity between multiple devices 54
3.8 Discovering the IMS entry point 55
3.9 S-CSCF assignment 56
3.9.1 S-CSCF assignment during registration 57
3.9.2 S-CSCF assignment for an unregistered user 58
3.9.3 S-CSCF assignment in error cases 58
3.9.4 S-CSCF de-assignment 58
3.9.5 Maintaining S-CSCF assignment 58
3.10Mechanis m for controlling bearer traffic 58
3.10.1 Bearer authorization 60
3.10.2 Approval of the QoS commit function 70
3.10.3 Removal of the QoS commit function 71
3.10.4 Indication of bearer release function 71
3.10.5 Indication of bearer loss/recovery 71
3.10.6 Revoke function 71
3.10.7 Charging identifiers exchange function 72
3.10.8 Usage of Gq reference point 72
3.11 Charging 75
3.11.1 Charging architecture 75
3.11.2 Offline charging 76
3.11.3 Online charging 78
3.11.4 Flow-based charging 79
3.11.5 Charging reference points 80
3.11.6 Charging information correlation 84
3.11.7 Charging information distribution 86
3.12 User profile 86
3.12.1 Service profile 86
3.13 Service provision 90
3.13.1 Introduction 90
3.13.2 Creation of filter criteria 91
3.13.3 Selection of AS 93
3.13.4 AS behaviour 94
3.14 Connectivity between traditional CS users and IMS users 94
3.14.1 IMS-originated session toward a user in the CS core
network 94
3.14.2 CS-originated session toward a user in IMS 95
3.15 Fixed and mobile convergence 96
3.16 SIP compression 97
3.17 Interworking between IPv4 and IPv6 in the IMS 98
3.17.1 Introduction 98
3.17.2 IPv6-only versus dual stack 100
3.17.3 Interworking scenarios 101
3.17.4 Intra-domain scenarios 101
Contents vii
3.17.5 Inter-domain scenarios 101
3.17.6 Configuration and bootstrapping 101
3.17.7 IPv4-only access networks 103
3.18 Combination of CS and IMS services – combinational services 104
3.18.1 Introduction 104
3.18.2 Capability exchange 104
3.18.3 Parallel CS and IMS services 106
3.19 Security services in the IMS 106
3.19.1 IMS security model 106
3.19.2 Authentication and Key Agreement (AKA) 107
3.19.3 Network Domain Security (NDS) 109
3.19.4 IMS access security for SIP-based services 112
3.19.5 IMS access security for HTTP-based services 115
PART II SERVICES 117
4 Presence 119
4.1 Who will use the presence service? 119
4.2 Presence-enhanced services 120
4.3 Presence contributing to business 120
4.4 What is presence? 121
4.5 SIP for presence 121
4.6 Presence service architecture in IMS 122
4.7 Presentity list 123
4.8 Setting presence authorization 123
4.9 Publishing presence 124
4.10Watcher information event template package 124
4.11 Example signalling flows of presence service operation 124
4.11.1 Successful subscription to presence 124
4.11.2 Successful publication of presence information 124
4.11.3 Subscribing to a resource list 125
4.11.4 Subscribing to watcher information 125
5 Messaging 127
5.1 Overview of IMS messaging 127
5.2 IMS messaging architecture 127
5.3 Immediate messaging 128
5.4 Session-based messaging 128
5.5 Deferred delivery messaging 130
6 Push to talk Over Cellular 131
6.1 PoC architecture 131
6.1.1 PoC server 133
6.1.2 PoC client 135
viii Contents
6.2 PoC features 135
6.2.1 PoC communication 135
6.2.2 Simultaneous PoC sessions 136
6.2.3 PoC session establishment models 137
6.2.4 Incoming PoC session treatment 139
6.2.5 Instant personal alerts 142
6.2.6 Group advertisement 143
6.2.7 Barring features 144
6.2.8 Participant information 145
6.3 User plane 145
6.3.1 Talk bursts 146
6.3.2 Talk burst control 146
6.3.3 Quality feedback 148
6.4 PoC service settings 149
7 Conferencing 151
7.1 Conferencing architecture 151
7.2 SIP event package for conference state 152
7.3 Example signalling flows of conferencing service operation 152
7.3.1 Creating a conference with a conference factory URI 152
7.3.2 Referring a user to a conference using the REFER request 153
7.3.3 Subscribing to a conference state 153
8 Group management 155
8.1 Group management’s contribution to business 156
8.2 What is group management? 156
8.3 Resource list 157
8.4 XCAP usage for resource lists 159
8.5 PoC XML Document Management (XDM) specification 160
8.6 PoC XDM application usages 160
8.6.1 PoC group 160
8.6.2 PoC user access policy 162
PART III DETAILED PROCEDURES 165
9 Introduction to detailed procedures 167
9.1 The example scenario 167
9.2 Base standards 168
10 An example IMS registration 171
10.1 Overview 171
10.2 Signalling PDP context establishment 173
10.3 P-CSCF discovery 173
10.4 Transport protocols 174
Contents ix
10.5 SIP registration and registration routing aspects 174
10.5.1 Overview 174
10.5.2 Constructing the REGISTER request 174
10.5.3 From the UE to the P-CSCF 177
10.5.4 From the P-CSCF to the I-CSCF 178
10.5.5 From the I-CSCF to the S-CSCF 178
10.5.6 Registration at the S-CSCF 179
10.5.7 The 200 (OK) response 180
10.5.8 The Service-Route header 180
10.5.9 The Path header 181
10.5.10 Third-party registration to application servers 181
10.5.11 Related standards 183
10.6 Authentication 183
10.6.1 Overview 183
10.6.2 HTTP digest and 3GPP AKA 185
10.6.3 Authentication information in the initial REGISTER
request 185
10.6.4 S-CSCF challenges the UE 186
10.6.5 UE’s response to the challenge 187
10.6.6 Integrity protection and successful authentication 187
10.6.7 Related standards 188
10.7 Access security – IPsec SAs 188
10.7.1 Overview 188
10.7.2 Establishing an SA during initial registration 188
10.7.3 Handling of multiple sets of SAs in case of
re-authentication 190
10.7.4 SA lifetime 193
10.7.5 Port setting and routing 193
10.7.6 Related standards 197
10.8 SIP Security Mechanism Agreement 197
10.8.1 Why the SIP Security Mechanism Agreement is needed 197
10.8.2 Overview 198
10.8.3 Sip-Sec-Agree-related headers in the initial REGISTER
request 199
10.8.4 The Security-Server header in the 401 (Unauthorized)
response 200
10.8.5 Sip-Sec-Agree headers in the second REGISTER 200
10.8.6 Sip-Sec-Agree and re-registration 201
10.8.7 Related standards 202
10.9 Compression negotiation 203
10.9.1 Overview 203
10.9.2 Indicating willingness to use SigComp 204
10.9.3 comp¼SigComp parameter during registration 204
10.9.4 comp¼SigComp parameter in other requests 205
10.9.5 Related standards 205
x Contents
10.10 Access and location information 206
10.10.1 P-Access-Network-Info 206
10.10.2 P-Visited-Network-ID 206
10.10.3 Related standards 207
10.11 Charging-related information during registration 207
10.12 User identities 207
10.12.1 Overview 207
10.12.2 Public and private user identities for registration 208
10.12.3 Identity derivation without ISIM 209
10.12.4 Default public user identity/P-Associated-URI header 209
10.12.5 UE’s subscription to registration-state information 210
10.12.6 P-CSCF’s subscription to registration-state information 212
10.12.7 Elements of registration-state information 214
10.12.8 Registration-state information in the body of the
NOTIFY request 214
10.12.9 Example registration-state information 216
10.12.10 Multiple terminals and registration-state information 218
10.12.11 Related standards 218
10.13 Re-registration and re-authentication 219
10.13.1 User-initiated re-registration 219
10.13.2 Network-initiated re-authentication 219
10.13.3 Network-initiated re-authentication notification 220
10.13.4 Related standards 221
10.14 De-registration 221
10.14.1 Overview 221
10.14.2 User-initiated de-registration 223
10.14.3 Network-initiated de-registration 225
10.14.4 Related standards 226
10.15 Early IMS Secuirty 226
10.15.1 Example IMS registration with fallback to early IMS
security 226
10.15.2 Early IMS security scenarios 228
11 An example IMS session 231
11.1 Overview 231
11.2 Caller and callee identities 233
11.2.1 Overview 233
11.2.2 From and To headers 233
11.2.3 Identification of the calling user: P-Preferred-Identity and
P-Asserted-Identity 233
11.2.4 Identification of the called user 235
11.2.5 Related standards 237
11.3 Routing 237
11.3.1 Overview 237
11.3.2 Session, dialog, transactions and branch 238
Contents xi
11.3.3 Routing of the INVITE request 240
11.3.4 Routing of the first response 244
11.3.5 Re-transmission of the INVITE request and the
100 (Trying) response 246
11.3.6 Routing of subsequent requests in a dialog 247
11.3.7 Standalone transactions from one UE to another 248
11.3.8 Routing to and from ASs 248
11.3.9 Related standards 252
11.4 Compression negotiation 252
11.4.1 Overview 252
11.4.2 Compression of the initial request 252
11.4.3 Compression of responses 253
11.4.4 Compression of subsequent requests 254
11.4.5 Related standards 254
11.5 Media negotiation 254
11.5.1 Overview 254
11.5.2 Reliability of provisional responses 256
11.5.3 SDP offer/answer in IMS 257
11.5.4 Related standards 262
11.6 Resource reservation 263
11.6.1 Overview 263
11.6.2 The 183 (Session in Progress) response 264
11.6.3 Are preconditions mandatorily supported? 265
11.6.4 Preconditions 266
11.6.5 Related standards 271
11.7 Controlling the media 272
11.7.1 Overview 272
11.7.2 Media authorization 273
11.7.3 Grouping of media lines 274
11.7.4 A single reservation flow 274
11.7.5 Separated flows 274
11.7.6 Media policing 275
11.7.7 Related standards 275
11.8 Charging-related information for sessions 275
11.8.1 Overview 275
11.8.2 Exchange of ICID for a media session 278
11.8.3 Correlation of GCID and ICID 279
11.8.4 Distribution of charging function addresses 280
11.8.5 Related standards 281
11.9 Release of a session 281
11.9.1 User-initiated session release 281
11.9.2 P-CSCF performing network-initiated session release 282
11.9.3 S-CSCF performing network-initiated session release 283
11.10Alternat ive session establishment procedures 283
11.10.1 Introduction 283
11.10.2 IMS session setup when no resource reservation is needed 284
xii Contents
11.10.3 IMS session setup with resource reservation but without
preconditions 287
11.10.4 Session setup between IMS and a SIP end point outside
IMS 290
11.11 Routing of PSIs 293
11.11.1 Scenario 1: routing from a user to a PSI 293
11.11.2 Scenario 2: routing from a PSI to a user 294
11.11.3 Scenario 3: routing from a PSI to another PSI 294
PART IV PROTOCOLS 297
12 SIP 299
12.1 Background 299
12.2 Design principles 299
12.3 SIP architecture 300
12.4 Message format 302
12.4.1 Requests 303
12.4.2 Response 303
12.4.3 Header fields 304
12.4.4 Body 304
12.5 The SIP URI 305
12.6 The tel URI 305
12.7 SIP structure 306
12.7.1 Syntax and encoding layer 306
12.7.2 Transport layer 306
12.7.3 Transaction layer 307
12.7.4 TU layer 307
12.8 Registration 309
12.9 Dialogs 310
12.10Sessio ns 311
12.10.1 The SDP offer/answer model with SIP 312
12.11 Security 313
12.11.1 Threat models 313
12.11.2 Security framework 313
12.11.3 Mechanisms and protocols 314
12.12 Routing requests and responses 317
12.12.1 Server discovery 317
12.12.2 The loose routing concept 318
12.12.3 Proxy behaviour 318
12.12.4 Populating the request-URI 319
12.12.5 Sending requests and receiving responses 319
12.12.6 Receiving requests and sending responses 320
Contents xiii
12.13 SIP extensions 320
12.13.1 Event notification framework 320
12.13.2 State publication (the PUBLISH method) 322
12.13.3 SIP for instant messaging 322
12.13.4 Reliability of provisional responses 322
12.13.5 The UPDATE method 324
12.13.6 Integration of resource management and SIP
(preconditions) 324
12.13.7 The SIP REFER method 325
12.13.8 The ‘‘message/sipfrag’’ MIME type 326
12.13.9 SIP extension header for registering non-adjacent contacts
(the Path header) 326
12.13.10Private SIP extensions for asserted identity within trusted
networks 327
12.13.11 Security mechanism agreement for SIP 328
12.13.12 Private SIP extensions for media authorization 329
12.13.13 SIP extension header for service route discovery during
registration 330
12.13.14 Private header extensions to SIP for 3GPP 330
12.13.15 Compressing SIP 331
13 SDP 333
13.1 SDP message contents 333
13.1.1 Session description 333
13.1.2 Time description 334
13.1.3 Media description 334
13.2 SDP message format 335
13.3 Selected SDP lines 335
13.3.1 Protocol version line 335
13.3.2 Connection information line 335
13.3.3 Media line 335
13.3.4 Attribute line 336
13.3.5 The rtpmap attribute 336
14 The Offer/Answer Model with SDP 339
14.1 The offer 339
14.2 The answer 339
14.3 Offer/answer processing 340
14.3.1 Modifying a session description 340
14.3.2 Putting the media stream on hold 341
15 RTP 343
15.1 RTP for real-time data delivery 343
15.1.1 RTP fixed header fields 343
15.1.2 What is jitter? 344
xiv Contents
15.2 RTCP 344
15.2.1 RTCP packet types 345
15.2.2 RTCP report transmission interval 345
15.3 RTP profile and payload format specifications 345
15.3.1 Profile specification 345
15.3.2 Payload format specification 345
15.4 RTP profile and payload format specification for audio and video
(RTP/AVP) 346
15.4.1 Static and dynamic payload types 346
16 DNS 349
16.1 DNS resource records 349
16.2 The Naming Authority Pointer (NAPTR) DNS RR 349
16.2.1 NAPTR example 350
16.3 ENUM – the E.164 to Universal Resource Identifier (URI) Dynamic
Delegation Discovery System (DDDS) application 351
16.3.1 ENUM service registration for SIP Addresses Of Record
(AORs) 352
16.4 Service records (SRV RRs) 352
16.4.1 SRV example 352
17 GPRS 355
17.1 Overview 355
17.2 Packet Data Protocol (PDP) 355
17.2.1 Primary PDP context activation 355
17.2.2 Secondary PDP context activation 356
17.2.3 PDP context modification 356
17.2.4 PDP context deactivation 356
17.3 Access points 356
17.4 PDP context types 357
18 TLS 359
18.1 Introduction 359
18.2 TLS Record Protocol 359
18.3 TLS Handshake Protocol 360
18.4 Summary 361
19 Diameter 363
19.1 Introduction 363
19.2 Protocol components 364
19.3 Message processing 364
19.4 Diameter clients and servers 365
19.5 Diameter agents 366
19.6 Message structure 366
19.7 Error handling 368
Contents xv
19.8 Diameter services 368
19.8.1 Authentication and authorization 369
19.8.2 Accounting 369
19.9 Specific Diameter applications used in 3GPP 370
19.10Diameter SIP application 370
19.11 Diameter credit control application 373
19.12 Summary 373
20 MEGACO 375
20.1 Introduction 375
20.2 Connection model 375
20.3 Protocol operation 375
21 COPS 379
21.1 Introduction 379
21.2 Message structure 380
21.3 COPS usage for policy provisioning (COPS-PR) 383
21.4 The PIB for the Go interface 383
21.5 Summary 383
22 IPsec 385
22.1 Introduction 385
22.2 Security associations 386
22.3 Internet Security Association and Key Management Protocol
(ISAKMP) 386
22.4 Internet Key Exchange (IKE) 387
22.5 Encapsulated Security Payload (ESP) 387
22.6 Summary 388
23 Signalling Compression 389
23.1 SigComp architecture 389
23.2 Compartments 390
23.3 Compressing a SIP message in IMS 390
23.3.1 Initialization of SIP compression 390
23.3.2 Compressing a SIP message 391
23.3.3 Decompressing a compressed SIP message 391
24 DHCPv6 393
24.1 DHCP options 394
24.2 DHCP options for SIP servers 394
25 XCAP 395
25.1 XCAP application usage 395
xvi Contents
26 Common Policy 397
26.1 Introduction 397
26.2 Model and rule structure 397
26.3 Data types and permission processing 399
References 401
List ofabbrevi ations 409
Index 417
[
本帖最后由 ghosthe124 于 2007-6-19 11:15 編輯 ]