Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
CITATION
Russell, Travis
.
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
.
US
: McGraw-Hill Osborne Media, 2007.
Add to Favorites
Email to a Friend
Download Citation
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
Authors:
Travis Russell
Published:
December 2007
eISBN:
9780071594646 0071594647
|
ISBN:
9780071488532
Open eBook
Book Description
Table of Contents
Contents
Foreword
Acknowledgments
Introduction
Chapter 1 Architecture of the IMS
IMS Concepts
The Intelligent Network and Signaling System #7
Entities in an IMS Core Network
Call Session Control Function (CSCF)
IMS Reference Points
Chapter 2 Moving from Legacy to Convergence
Migrating the Backbone to an IP-Based Network
Deploying VoIP as a Growth Strategy
Deploying IMS
Interworking Between the Legacy Network and IMS
Migrating the OSS/BSS
Interfacing to the IMS
Circuit-Switched Domains (CS)
Packet-Switched Domains (PS)
VoIP Domain
General Packet Radio Service (GPRS)
UMTS and CDMA Domains
From IMS to IMS
Chapter 3 Session Initiation Protocol (SIP)
SIP Protocol Structure
SIP Methods
SIP Requests
SIP Responses
SIP Header Fields
Session Description Protocol (SDP)
Session Level Description
Time Description
Media Description
Media Attribute Lines (a=)
Chapter 4 Addressing in the IMS
Device Identity in the IMS
SIP Identities in the IMS
Domain Names and URIs
User Identities
Chapter 5 Establishing a Session in the IMS
Accessing the Network
Locating the P-CSCF
Registration in the IMS Using SIP
Basic Session Registration
Interworking with the PSTN
Interworking with VoIP
Establishing Sessions in the IMS Using SIP
Basic Session Establishment
Emergency Session Establishment
Modifying SIP Sessions in the IMS
Terminating SIP Sessions in the IMS
Chapter 6 Security Procedures in the IMS
Security Threats in an IP Domain
Eavesdropping
Registration Hijacking
Server Impersonation
Message Body Tampering
Session Teardown
Denial-of-Service Attacks
Amplification
Securing the IMS
Authentication & Authorization
Confidentiality
Denial of Service
Integrity
Privacy
Non-Repudiation
Access Security
Encryption
Authentication and Key Agreement
Network Domain Security
Chapter 7 Online and Offline Charging in the IMS
Introduction to Charging
Charging Architecture
User Profile
Accounting with DIAMETER
Charging in the IMS
Appendix A: 3GPP Documentation
IMS-Related Documentation
IETF IMS-Related Documentation
Appendix B: Bibliography
Index