| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
| |
Architecture of the IMS | |
| |
| |
IMS Concepts | |
| |
| |
The Intelligent Network and Signaling System #7 | |
| |
| |
Entities in an IMS Core Network | |
| |
| |
Call Session Control Function (CSCF) | |
| |
| |
IMS Reference Points | |
| |
| |
| |
Moving from Legacy to Convergence | |
| |
| |
Migrating the Backbone to an IP-Based Network | |
| |
| |
Deploying VoIP as a Growth Strategy | |
| |
| |
Deploying IMS | |
| |
| |
Interworking Between the Legacy Network and IMS | |
| |
| |
Migrating the OSS/BSS | |
| |
| |
Interfacing to the IMS | |
| |
| |
Circuit-Switched Domains (CS) | |
| |
| |
Packet-Switched Domains (PS) | |
| |
| |
VoIP Domain | |
| |
| |
General Packet Radio Service (GPRS) | |
| |
| |
UMTS and CDMA Domains | |
| |
| |
From IMS to IMS | |
| |
| |
| |
Session Initiation Protocol (SIP) | |
| |
| |
SIP Protocol Structure | |
| |
| |
SIP Methods | |
| |
| |
SIP Requests | |
| |
| |
SIP Responses | |
| |
| |
SIP Header Fields | |
| |
| |
Session Description Protocol (SDP) | |
| |
| |
Session Level Description | |
| |
| |
Time Description | |
| |
| |
Media Description | |
| |
| |
Media Attribute Lines (a=) | |
| |
| |
| |
Addressing in the IMS | |
| |
| |
Device Identity in the IMS | |
| |
| |
SIP Identities in the IMS | |
| |
| |
Domain Names and URIs | |
| |
| |
User Identities | |
| |
| |
| |
Establishing a Session in the IMS | |
| |
| |
Accessing the Network | |
| |
| |
Locating the P-CSCF | |
| |
| |
Registration in the IMS Using SIP | |
| |
| |
Basic Session Registration | |
| |
| |
Interworking with the PSTN | |
| |
| |
Interworking with VoIP | |
| |
| |
Establishing Sessions in the IMS Using SIP | |
| |
| |
Basic Session Establishment | |
| |
| |
Emergency Session Establishment | |
| |
| |
Modifying SIP Sessions in the IMS | |
| |
| |
Terminating SIP Sessions in the IMS | |
| |
| |
| |
Security Procedures in the IMS | |
| |
| |
Security Threats in an IP Domain | |
| |
| |
Eavesdropping | |
| |
| |
Registration Hijacking | |
| |
| |
Server Impersonation | |
| |
| |
Message Body Tampering | |
| |
| |
Session Teardown | |
| |
| |
Denial-of-Service Attacks | |
| |
| |
Amplification | |
| |
| |
Securing the IMS | |
| |
| |
Authentication & Authorization | |
| |
| |
Confidentiality | |
| |
| |
Denial of Service | |
| |
| |
Integrity | |
| |
| |
Privacy | |
| |
| |
Non-Repudiation | |
| |
| |
Access Security | |
| |
| |
Encryption | |
| |
| |
Authentication and Key Agreement | |
| |
| |
Network Domain Security | |
| |
| |
| |
Online and Offline Charging in the IMS | |
| |
| |
Introduction to Charging | |
| |
| |
Charging Architecture | |
| |
| |
User Profile | |
| |
| |
Accounting with DIAMETER | |
| |
| |
Charging in the IMS | |
| |
| |
| |
3GPP Documentation | |
| |
| |
IMS-Related Documentation | |
| |
| |
IETF IMS-Related Documentation | |
| |
| |
| |
Bibliography | |
| |
| |
Index | |