Skip to content

IP Multimedia Subsystem (IMS): Session Control and Other Network Operations

Best in textbook rentals since 2012!

ISBN-10: 0071488537

ISBN-13: 9780071488532

Edition: 2008

Authors: Travis Russell

List price: $94.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $94.00
Copyright year: 2008
Publisher: McGraw-Hill Education
Publication date: 1/7/2008
Binding: Hardcover
Pages: 224
Size: 8.00" wide x 9.00" long x 1.00" tall
Weight: 0.990
Language: English

Foreword
Acknowledgments
Introduction
Architecture of the IMS
IMS Concepts
The Intelligent Network and Signaling System #7
Entities in an IMS Core Network
Call Session Control Function (CSCF)
IMS Reference Points
Moving from Legacy to Convergence
Migrating the Backbone to an IP-Based Network
Deploying VoIP as a Growth Strategy
Deploying IMS
Interworking Between the Legacy Network and IMS
Migrating the OSS/BSS
Interfacing to the IMS
Circuit-Switched Domains (CS)
Packet-Switched Domains (PS)
VoIP Domain
General Packet Radio Service (GPRS)
UMTS and CDMA Domains
From IMS to IMS
Session Initiation Protocol (SIP)
SIP Protocol Structure
SIP Methods
SIP Requests
SIP Responses
SIP Header Fields
Session Description Protocol (SDP)
Session Level Description
Time Description
Media Description
Media Attribute Lines (a=)
Addressing in the IMS
Device Identity in the IMS
SIP Identities in the IMS
Domain Names and URIs
User Identities
Establishing a Session in the IMS
Accessing the Network
Locating the P-CSCF
Registration in the IMS Using SIP
Basic Session Registration
Interworking with the PSTN
Interworking with VoIP
Establishing Sessions in the IMS Using SIP
Basic Session Establishment
Emergency Session Establishment
Modifying SIP Sessions in the IMS
Terminating SIP Sessions in the IMS
Security Procedures in the IMS
Security Threats in an IP Domain
Eavesdropping
Registration Hijacking
Server Impersonation
Message Body Tampering
Session Teardown
Denial-of-Service Attacks
Amplification
Securing the IMS
Authentication & Authorization
Confidentiality
Denial of Service
Integrity
Privacy
Non-Repudiation
Access Security
Encryption
Authentication and Key Agreement
Network Domain Security
Online and Offline Charging in the IMS
Introduction to Charging
Charging Architecture
User Profile
Accounting with DIAMETER
Charging in the IMS
3GPP Documentation
IMS-Related Documentation
IETF IMS-Related Documentation
Bibliography
Index