You are previewing The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Third Edition.
O'Reilly logo
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Third Edition

Book Description

Third edition of this best-selling guide to IMS: fully revised, and updated with brand new material

The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world. It makes Internet technologies such as the web, email, instant messaging, presence, and videoconferencing available nearly everywhere at any time.

The third edition of this bestselling book is fully updated and provides comprehensively expanded content, including new chapters on emergency calls and on Voice Call Continuity (VCC). As well as this, The 3G IP Multimedia Subsystem (IMS) presents updated material including a comprehensive picture of Session Initiation Protocol (SIP) as well as its applicability to IMS. As most of the protocols have been designed in the IETF, this book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture.

This is an indispensable guide for engineers, programmers, business managers, marketing representatives and technically aware users who want to understand how the IMS works and explore the business model behind it.

  • New chapters on emergency calls, Voice Call Continuity (VCC), service configuration (XCAP, XDM), and conferencing

  • Fully updated throughout, including Policy and Charging Control (PCC), QoS, Presence, Instant Messaging, Multimedia Telephony Services, and Push-to-talk over Cellular (PoC)

  • Describes the IP Multimedia Subsystem from two different perspectives: from the IETF perspective, and from the 3GPP perspective.

  • Provides details on the latest policy technology and security architecture

  • Written by experienced professionals in the field.

Table of Contents

  1. Cover
  2. Title page
  3. Copyright Page
  4. Dedication
  5. Foreword by Stephen Hayes
  6. Foreword by Allison Mankin and Jon Peterson
  7. About the Authors
  8. Preface to the First Edition
  9. Preface to the Second Edition
  10. Preface to the Third Edition
  11. Acknowledgements
  12. Part I Introduction to the IMS
    1. Chapter 1 IMS Vision: Where Do We Want to Go?
      1. 1.1 The Internet
      2. 1.2 The Cellular World
      3. 1.3 Why do we need the IMS?
      4. 1.4 Relation between IMS and non-IMS Services
    2. Chapter 2 The History of the IMS Standardization
      1. 2.1 Relations between IMS-related Standardization Bodies
      2. 2.2 Internet Engineering Task Force
      3. 2.3 Third Generation Partnership Project
      4. 2.4 Third Generation Partnership Project 2
      5. 2.5 IETF-3GPP/3GPP2 Collaboration
      6. 2.6 Open Mobile Alliance
    3. Chapter 3 General Principles of the IMS Architecture
      1. 3.1 From Circuit-switched to Packet-switched
      2. 3.2 IMS Requirements
      3. 3.3 Overview of Protocols used in the IMS
      4. 3.4 Overview of IMS Architecture
      5. 3.5 Identification in the IMS
      6. 3.6 SIM, USIM, and ISIM in 3GPP
      7. 3.7 Next Generation Networks (NGN)
  13. Part II The Signaling Plane in the IMS
    1. Chapter 4 Session Control on the Internet
      1. 4.1 SIP Functionality
      2. 4.2 SIP Entities
      3. 4.3 Message Format
      4. 4.4 The Start Line in SIP Responses: the Status Line
      5. 4.5 The Start Line in SIP Requests: the Request Line
      6. 4.6 Header Fields
      7. 4.7 Message Body
      8. 4.8 SIP Transactions
      9. 4.9 Message Flow for Session Establishment
      10. 4.10 SIP Dialogs
      11. 4.11 Extending SIP
      12. 4.12 Caller Preferences and User Agent Capabilities
      13. 4.13 Reliability of Provisional Responses
      14. 4.14 Preconditions
      15. 4.15 Event Notification
      16. 4.16 Signaling Compression
      17. 4.17 Content Indirection
      18. 4.18 The REFER Method
      19. 4.19 Globally Routable User Agent URIs (GRUU)
      20. 4.20 NAT Traversal
    2. Chapter 5 Session Control in the IMS
      1. 5.1 Prerequisites for Operation in the IMS
      2. 5.2 IPv4 and IPv6 in the IMS
      3. 5.3 IP Connectivity Access Network
      4. 5.4 P-CSCF Discovery
      5. 5.5 IMS-level Registration
      6. 5.6 Subscription to the reg Event State
      7. 5.7 Basic Session Setup
      8. 5.8 Application Servers: Providing Services to Users
      9. 5.9 Changes due to Next Generation Networks (NGN)
      10. 5.10 Interworking
      11. 5.11 Combinational Services
      12. 5.12 Basic Sessions Not Requiring Resource Reservation
      13. 5.13 Globally Routable User Agent URIs (GRUU) in IMS
      14. 5.14 IMS Communication Service Identifier (ICSI)
      15. 5.15 IMS Application Reference Identifier (IARI)
      16. 5.16 NAT Traversal in the IMS
    3. Chapter 6 AAA on the Internet
      1. 6.1 Authentication, Authorization, and Accounting
      2. 6.2 AAA Framework on the Internet
      3. 6.3 The Diameter Protocol
    4. Chapter 7 AAA in the IMS
      1. 7.1 Authentication and Authorization in the IMS
      2. 7.2 The Cx and Dx Interfaces
      3. 7.3 The Sh Interface
      4. 7.4 Accounting
    5. Chapter 8 Policy and Charging Control in the IMS
      1. 8.1 PCC Architecture
      2. 8.2 Charging Architecture
      3. 8.3 Offline Charging Architecture
      4. 8.4 Online Charging Architecture
    6. Chapter 9 Quality of Service on the Internet
      1. 9.1 Integrated Services
      2. 9.2 Differentiated Services
    7. Chapter 10 Quality of Service in the IMS
      1. 10.1 Policy Control and QoS
      2. 10.2 Instructions to Perform Resource Reservations
      3. 10.3 Reservations by the Terminals
      4. 10.4 QoS in the Network
    8. Chapter 11 Security on the Internet
      1. 11.1 HTTP Digest Access Authentication
      2. 11.2 Certificates
      3. 11.3 TLS
      4. 11.4 S/MIME
      5. 11.5 Authenticated Identity Body
      6. 11.6 IPsec
      7. 11.7 Privacy
      8. 11.8 Encrypting Media Streams
    9. Chapter 12 Security in the IMS
      1. 12.1 Access Security
      2. 12.2 Network Security
    10. Chapter 13 Emergency Calls on the Internet
      1. 13.1 Introduction
      2. 13.2 Location Acquisition
      3. 13.3 Identifying Emergency Calls
      4. 13.4 Locating the Closest PSAP
      5. 13.5 Issuing the Emergency Call
    11. Chapter 14 Emergency Calls in the IMS
      1. 14.1 Architecture for Supporting Emergency Calls in IMS
      2. 14.2 Establishing an Emergency Call in IMS
      3. 14.3 IMS Registration for Emergency Calls
      4. 14.4 Call Back from the PSAP to a User
      5. 14.5 Anonymous Calls
      6. 14.6 Emergency Calls in Fixed Broadband Accesses
  14. Part III The Media Plane in the IMS
    1. Chapter 15 Media Encoding
      1. 15.1 Speech Encoding
      2. 15.2 Video Encoding
      3. 15.3 Text Encoding
      4. 15.4 Mandatory Codecs in the IMS
    2. Chapter 16 Media Transport
      1. 16.1 Reliable Media Transport
      2. 16.2 Unreliable Media Transport
      3. 16.3 Media Transport in the IMS
  15. Part IV Building Services with the IMS
    1. Chapter 17 Service Configuration on the Internet
      1. 17.1 The XML Configuration Access Protocol (XCAP)
      2. 17.2 An Overview of XML
      3. 17.3 HTTP URIs that Identify XCAP Resources
      4. 17.4 XCAP Operations
      5. 17.5 Entity Tags and Conditional Operations
      6. 17.6 Subscriptions to Changes in XML Documents
      7. 17.7 XML Patch Operations
    2. Chapter 18 Service Configuration in the IMS
      1. 18.1 XDM architecture
      2. 18.2 Downloading an XML Document, Attribute, or Element
      3. 18.3 Directory Retrieval
      4. 18.4 Data Search with XDM
      5. 18.5 Subscribing to Changes in XML Documents
    3. Chapter 19 The Presence Service on the Internet
      1. 19.1 Overview of the Presence Service
      2. 19.2 The Presence Life Cycle
      3. 19.3 Presence Subscriptions and Notifications
      4. 19.4 Presence Publication
      5. 19.5 Presence Information Data Format (PIDF)
      6. 19.6 The Presence Data Model for SIP
      7. 19.7 Mapping the SIP Presence Data Model to the PIDF
      8. 19.8 Rich PIDF
      9. 19.9 CIPID
      10. 19.10 Timed Presence Extension to the PIDF
      11. 19.11 Presence Capabilities
      12. 19.12 Geographical Location in Presence
      13. 19.13 Watcher Information
      14. 19.14 Watcher Authorization: Presence Authorization Rules
      15. 19.15 URI-list Services and Resource Lists
      16. 19.16 Presence Optimizations
    4. Chapter 20 The Presence Service in the IMS
      1. 20.1 The Foundation of Services
      2. 20.2 Presence Architecture in the IMS
      3. 20.3 Presence Publication
      4. 20.4 Watcher Subscription
      5. 20.5 Watcher Information and Authorization of Watchers
      6. 20.6 Presence Optimizations
      7. 20.7 OMA Extensions to PIDF
    5. Chapter 21 Instant Messaging on the Internet
      1. 21.1 The im URI
      2. 21.2 Modes of Instant Messages
      3. 21.3 Pager-mode Instant Messaging
      4. 21.4 Session-based Instant Messaging
      5. 21.5 The “isComposing” Indication
      6. 21.6 Messaging Multiple Parties
      7. 21.7 File Transfer
    6. Chapter 22 The Instant Messaging Service in the IMS
      1. 22.1 Pager-mode Instant Messaging in the IMS
      2. 22.2 Pager-mode Instant Messaging to Multiple Recipients
      3. 22.3 Session-based Instant Messaging in the IMS
      4. 22.4 File Transfer
    7. Chapter 23 Conferencing on the Internet
      1. 23.1 Conferencing Standardization at the IETF
      2. 23.2 The SIPPING Conferencing Framework
      3. 23.3 The XCON Conferencing Framework
      4. 23.4 The Binary Floor Control Protocol (BFCP)
    8. Chapter 24 Conferencing in the IMS
      1. 24.1 The IMS Conferencing Service
      2. 24.2 Relation with the Work in TISPAN and OMA
    9. Chapter 25 Push-to-talk over Cellular
      1. 25.1 PoC Standardization
      2. 25.2 IETF Work Relevant to PoC
      3. 25.3 Architecture
      4. 25.4 Registration
      5. 25.5 PoC Server Roles
      6. 25.6 PoC Session Types
      7. 25.7 Adding Users to a PoC Session
      8. 25.8 Group Advertisements
      9. 25.9 Session Establishment Types
      10. 25.10 Answer Modes
      11. 25.11 Right-to-send-media Indication Types
      12. 25.12 Participant Information
      13. 25.13 Barring and Instant Personal Alerts
      14. 25.14 Full Duplex Call Follow On
      15. 25.15 The User Plane
      16. 25.16 Simultaneous PoC Sessions
      17. 25.17 Charging in PoC
    10. Chapter 26 Multimedia Telephony Services: PSTN/ISDN Simulation Services
      1. 26.1 Providing Audible Announcements
      2. 26.2 Communication Diversion (CDIV) and Communication Forwarding
      3. 26.3 Communication Diversion Notification (CDIVN)
      4. 26.4 Conference (CONF)
      5. 26.5 Message Waiting Indication (MWI)
      6. 26.6 Originating Identification Presentation/Restriction (OIP, OIR)
      7. 26.7 Terminating Identification Presentation/Restriction (TIP, TIR)
      8. 26.8 Anonymous Communication Rejection (ACR) and Communication Barring (CB)
      9. 26.9 Advice of Charge (AoC)
      10. 26.10 Completion of Communications to Busy Subscriber (CCBS) and Completion of Communications on No Reply (CCNR)
      11. 26.11 Malicious Communication Identification (MCID)
      12. 26.12 Communication Hold (HOLD)
      13. 26.13 Explicit Communication Transfer (ECT)
      14. 26.14 User Settings in PSTN/ISDN Simulation Services
    11. Chapter 27 Voice Call Continuity
      1. 27.1 Overview of Voice Call Continuity
      2. 27.2 VCC Architecture
      3. 27.3 Registration
      4. 27.4 Call Origination and Anchoring
      5. 27.5 Call Termination and Anchoring
      6. 27.6 Domain Transfer
  16. Appendix A: List of IMS-related Specifications
    1. A.1 Introduction
    2. A.2 3GPP Specifications
    3. A.3 ETSI NGN Specifications
    4. A.4 OMA Specifications
  17. References
  18. Index