CITATION

Russell, Travis. The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations. US: McGraw-Hill Osborne Media, 2007.

The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations

Published:  December 2007

eISBN: 9780071594646 0071594647 | ISBN: 9780071488532
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Chapter 1 Architecture of the IMS
  • IMS Concepts
  • The Intelligent Network and Signaling System #7
  • Entities in an IMS Core Network
  • Call Session Control Function (CSCF)
  • IMS Reference Points
  • Chapter 2 Moving from Legacy to Convergence
  • Migrating the Backbone to an IP-Based Network
  • Deploying VoIP as a Growth Strategy
  • Deploying IMS
  • Interworking Between the Legacy Network and IMS
  • Migrating the OSS/BSS
  • Interfacing to the IMS
  • Circuit-Switched Domains (CS)
  • Packet-Switched Domains (PS)
  • VoIP Domain
  • General Packet Radio Service (GPRS)
  • UMTS and CDMA Domains
  • From IMS to IMS
  • Chapter 3 Session Initiation Protocol (SIP)
  • SIP Protocol Structure
  • SIP Methods
  • SIP Requests
  • SIP Responses
  • SIP Header Fields
  • Session Description Protocol (SDP)
  • Session Level Description
  • Time Description
  • Media Description
  • Media Attribute Lines (a=)
  • Chapter 4 Addressing in the IMS
  • Device Identity in the IMS
  • SIP Identities in the IMS
  • Domain Names and URIs
  • User Identities
  • Chapter 5 Establishing a Session in the IMS
  • Accessing the Network
  • Locating the P-CSCF
  • Registration in the IMS Using SIP
  • Basic Session Registration
  • Interworking with the PSTN
  • Interworking with VoIP
  • Establishing Sessions in the IMS Using SIP
  • Basic Session Establishment
  • Emergency Session Establishment
  • Modifying SIP Sessions in the IMS
  • Terminating SIP Sessions in the IMS
  • Chapter 6 Security Procedures in the IMS
  • Security Threats in an IP Domain
  • Eavesdropping
  • Registration Hijacking
  • Server Impersonation
  • Message Body Tampering
  • Session Teardown
  • Denial-of-Service Attacks
  • Amplification
  • Securing the IMS
  • Authentication & Authorization
  • Confidentiality
  • Denial of Service
  • Integrity
  • Privacy
  • Non-Repudiation
  • Access Security
  • Encryption
  • Authentication and Key Agreement
  • Network Domain Security
  • Chapter 7 Online and Offline Charging in the IMS
  • Introduction to Charging
  • Charging Architecture
  • User Profile
  • Accounting with DIAMETER
  • Charging in the IMS
  • Appendix A: 3GPP Documentation
  • IMS-Related Documentation
  • IETF IMS-Related Documentation
  • Appendix B: Bibliography
  • Index