IMS Procedures and Protocols
|
|
|
- Laurence Fisher
- 10 years ago
- Views:
Transcription
1 Reference Guide IMS Procedures and Protocols The LTE User Equipment Perspective
2 TABLE OF CONTENTS 1. EXECUTIVE SUMMARY INTRODUCTION IMS PROCEDURES PDN Connectivity (NAS Signaling) Authentication Bearer Setup and EPS Attach P-CSCF Discovery SIP Registration Event Subscription VoLTE Call IMS PROTOCOLS SIP SIP requests Session Description Protocol (SDP) SIP Responses SigComp (Signaling Compression) The Real-time Transport Protocol (RTP) and RTP Control Protocol (RTCP) IMS CLIENT-RELATED SECURITY Security association between the User Agent and a P-CSCF Security association between the ISIM and the HSS SAMPLE SIP CALL FLOWS Registration Event Subscription VoLTE Call SMS CONCLUSION APPENDIX SIP Headers SIP Codes ACRONYMS REFERENCE GUIDE 1
3 IMS Procedures and Protocols The LTE User Equipment Perspective 1. EXECUTIVE SUMMARY This reference guide presents an overview of the procedures and protocols used in IMS-based LTE systems, from the perspective of the UE. To illustrate the concepts being discussed, several sample protocol exchanges, captured from a live network, are broken down and described in more detail. 2. INTRODUCTION IMS represents a substantial challenge to those charged with developing LTE UEs. For one thing, the flexibility allowed in offer/ answer SIP messaging represents a double-edged sword. While the advantages of flexibility are obvious, one resulting challenge is a large number of equally valid protocol flows. Unless both the intuitive intent and details of the protocols are understood, developers can be tempted to design for specific known cases rather than for all valid cases. CORRESPONDING LITERATURE WHITE PAPER IMS Architecture: The LTE User Equipment Perspective WHITE PAPER VoLTE Deployment and The Radio Access Network: The LTE User Equipment Perspective POSTERS IMS/VoLTE Reference Guide LTE and the Mobile Internet Today s UE developers must deal with increased complexity on a variety of fronts. The deployment of LTE introduces a multitude of inter-rat (Radio Access Technology) mobility scenarios, new antenna techniques such as MIMO and Quality of Service (QoS) challenges with next-generation services such as Voice over LTE (VoLTE). With IMS and its associated Session Initiation Protocol (SIP) being essential in deploying LTE services, UE developers and wireless operators continue to focus on IMS functional and SIP signaling conformance testing. Most discussions of IMS protocols are general overviews containing a small minority of content of interest to the UE developer. This paper is an attempt to provide an intuitive introduction to IMS procedures and protocols, focusing on those concepts most relevant to the UE designer in deploying LTE services such as VoLTE. 2 REFERENCE GUIDE
4 3. IMS PROCEDURES UE RRC Connection Request EPC & IMS Any discussion of IMS protocols must start with a dialogue describing the procedures being implemented. It is important to note that there is no one size fits all procedural flow; IMS in LTE offers a lot of flexibility to both network equipment manufacturers and network operators. Note that the processes described here are strictly from the UE s point of view, without discussion of the many intra-network procedures required to make the system work. RRC Connection Setup RRC Connection Setup Complete (Attach Request PDN Connectivity) Downlink Transfer (Authentication Request) Uplink Transfer (Authentication Response) Downlink Transfer (Security Mode Command) Uplink Transfer (Security Mode Complete) PDN Connectivity Request contains Protocol Configuration Options IE with request for P-CSCF address The processes involved in a Voice over LTE (VoLTE) call can provide a meaningful background and a fairly typical scenario. From the UE s point of view the initial step is to listen for system information in the form of Master Information Blocks (MIBs) and System Information Blocks (SIBs). Once that information has been processed the UE can initiate its own processes. These processes are outlined in the next section. The graphical depiction in Figure 1 is not meant to distinguish between multiple protocol layers; it is merely an intuitive impression of the required processes. Downlink Transfer (ESM Information request) Uplink Transfer (ESM Information Response) RRC Connection Reconfiguration (Attach Accept Activate EPS Bearer Context) RRC Connection Reconfiguration Complete Uplink Transfer (Attach Complete Activate EPS Bearer Accept) EPS Attach & P-CSCF Discovery REGISTER 401 UNAUTHORIZED IMS PDN and P-CSCF IP addresses are provided REGISTER 200 OK SUBSCRIBE UE has completed initial IMS registration 200 OK NOTIFY 200 OK Invite SDP 100 Trying UE has completed subscription to the registration event package 180 Ringing PRACK 200 OK 200 OK (SDP Answer) ACK VoLTE Call is Established RTP Voice Traffic Figure 1 - Multi-layer procedural flow required for a VoLTE call REFERENCE GUIDE 3
5 IMS Procedures and Protocols The LTE User Equipment Perspective 3.1. PDN Connectivity (NAS Signaling) UE RRC Connection Request EPC & IMS RRC Connection Setup RRC Connection Setup Complete (Attach Request PDN Connectivity) As in legacy 3GPP technologies, the UE starts connection by issuing a Radio Resource Control (RRC) Connection Request. Note that while either the UE or the network can trigger the connection request, it is always initiated by the UE. This request includes both the UE identity information and the call establishment cause (i.e. Mobile Originating Signaling or Emergency). Assuming there are no issues, the network responds with an RRC Connection Setup message. The procedure thus far has established a signaling bearer and a Dedicated Control Channel (DCCH). Once in RRC Connected mode, the UE responds by sending an RRC Connection Setup Complete message which includes the Attach request for PDN connectivity. While this part of the connection is familiar to those versed in 3G technologies, it is worth noting that at this point, unlike in a legacy UMTS system, the initial NAS message has already been delivered to the Mobility Management Entity (MME). In the case of a VoLTE call this message would be an Attach Request Authentication UE Downlink Transfer (Authentication Request) Uplink Transfer (Authentication Response) Downlink Transfer (Security Mode Command) Uplink Transfer (Security Mode Complete) Downlink Transfer (ESM Information request) Uplink Transfer (ESM Information Response) EPC & IMS Now that NAS signaling is established, the network initiates an Authentication Request or challenge. Once the UE s Authentication Response is deemed valid, the network sends a NAS Security Mode Command. Note that while neither the Authentication Request nor the Authentication Response is integrity-protected, the Security Mode Command is protected. The UE then sends a Security Mode Complete message, establishing protected NAS signaling. In order to protect EPS Session Management (ESM) information, the network now sends an ESM Information Request; the UE reacts with an ESM Information response describing the now-protected protocol configuration options. 4 REFERENCE GUIDE
6 3.3. Bearer Setup and EPS Attach EPC & UE RRC Connection Reconfiguration IMS (Attach Accept Activate EPS Bearer Context) RRC Connection Reconfiguration Complete Uplink Transfer (Attach Complete Activate EPS Bearer Accept) At this point, additional radio bearers must be set up. The network sends an RRC Connection Reconfiguration to activate the EPS bearer. The UE confirms successful completion with an RRC Connection Reconfiguration Complete message and then finalizes the Attach procedure and accepts the activation of the EPS bearer. It should be noted that the way a default PDN is associated to an IMS device varies per the network operator. In some networks, powering on a device will cause it to attempt to establish a connection with an Internet PDN. In this case the device will only establish IMS connectivity when an IMS application needs to be serviced. A device used on another network will, on powering up, attempt to establish a connection with an IMS PDN, and display a No Service message if the connection is not made P-CSCF Discovery UE EPC & IMS EPS Attach & P-CSCF Discovery Before sending any Session Initiation Protocol (SIP) requests, the UE must perform P-CSCF Discovery, the process of identifying (by address) the correct Proxy-Call Session Control Function (P-CSCF). The P-CSCF address may be discovered in one of three different ways: 1. It may be stored in the IP Multimedia Services Identity Module (ISIM). 2. The UE may request it as part of the PDN connectivity request during the Attach process. 3. The UE may request an IP address and Fully Qualified Domain Name (FQDN) from a DHCP server and then perform a DNS query on the returned IP address and FQDN. The next part of the procedural flow includes IMS Registration, Event Subscription and Call Connection and utilizes key IMS protocols. For a detailed explanation of these protocols, please refer to the IMS Protocols and Sample Call Flows sections in this document. REFERENCE GUIDE 5
7 IMS Procedures and Protocols The LTE User Equipment Perspective 3.5. SIP Registration UE REGISTER EPC & IMS 401 UNAUTHORIZED REGISTER 200 OK After Authentication, Security and UE Capability requests, the network accepts the Attach request and activates the EPS bearer context. Once that has happened and the UE has also established a PDP context, a typical IMS SIP client registration (Figure 4) begins: 1. The IMS client attempts to register by sending a REGISTER request to the P-CSCF. 2. The P-CSCF forwards the REGISTER request to the I-CSCF. 3. The I-CSCF polls the HSS for data used to decide which S-CSCF should manage the REGISTER request. The I-CSCF then makes that decision. 4. The I-CSCF forwards the REGISTER request to the appropriate S-CSCF. 5. The S-CSCF typically sends the P-CSCF a 401 (UNAUTHORIZED) response as well as a challenge string in the form of a number used once or nonce. 6. The P-CSCF forwards the 401 UNAUTHORIZED response to the UE. 7. Both the UE and the network have stored some Shared Secret Data (SSD), the UE in its ISIM or USIM and the network on the HSS. The UE uses an algorithm per RFC (e.g. AKAv2-MD5) to hash the SSD and the nonce. 8. The UE sends a REGISTER request to the P-CSCF. This time the request includes the result of the hashed nonce and SSD. 9. The P-CSCF forwards the new REGISTER request to the I-CSCF. 10. The I-CSCF forwards the new REGISTER request to the S-CSCF. 11. The S-CSCF polls the HSS (via the I-CSCF) for the SSD, hashes it against the nonce and determines whether the UE should be allowed to register. Assuming the hashed values match, the S-CSCF sends 200 OK response to the P-CSCF. At this point an IPSec security association is established by the P-CSCF. 12. The P-CSCF forwards the 200 OK response to the UE. 1 Internet Engineering Task Force (IETF) RFC 3310: Hypertext Transfer Protocol (HTTP) Digest Authentication. Using Authentication and Key Agreement (AKA) 6 REFERENCE GUIDE
8 3 Select S-CSCF (based on data from HSS) REGISTER 2 I-CSCF REGISTER (with hashed SSD & nonce) 8 1 REGISTER UNAUTHORIZED (with nonce) 6 P-CSCF 9 REGISTER (with hashed SSD & nonce) UNAUTHORIZED (with nonce) 5 REGISTER 4 S-CSCF 10 REGISTER (with hashed SSD & nonce) OK OK Hash (SSD with nonce) Figure 2 - SIP Client Registration Each element described therefore has a unique set of roles in this arrangement: The UE initiates the registration sequence, attaches to the LTE network and activates the PDP context. It discovers which P-CSCF to use, then makes a deliberately unauthenticated registration attempt. It waits for the expected 401 response, extracts the nonce from the response and hashes it with the SSD before including the result in a second REGISTER request. The P-CSCF, typically resident in the visited network, acts as the UE s gateway into the UE s home network. It identifies the home IMS network, routes traffic to and from the home IMS network and establishes the IPSec security association. The I-CSCF, typically resident in the home network, acts as the front-end of the home IMS. It interfaces with the P-CSCF in the visited network and selects the S-CSCF (by querying the HSS). The S-CSCF, typically resident in the home network, handles the registration request from the I-CSCF, pulls authentication vectors from the HSS and passes them to the P-CSCF (via the I-CSCF), and authenticates the user in the second registration attempt. REFERENCE GUIDE 7
9 IMS Procedures and Protocols The LTE User Equipment Perspective 3.6. Event Subscription UE SUBSCRIBE EPC & IMS 200 OK NOTIFY 200 OK Suppose the UE now intends to monitor a specific registration event. In this context an event may be a callback (to provide audio for a shared web event, for example) or an update to a buddy list or a message waiting indicator. In general, this means that the UE is asking to be notified any time there is a change in registration status and it requires cooperation between two end nodes. It is an essential part of IMS since it enables the concept of subscriber presence. The UE will begin the transaction using the SUBSCRIBE method. This method, defined in RFC 3265, is one of the many SIP extensions used in IMS. This is basically a request to be notified (for a specified period of time) of a change in resource state. As is shown in the call flow section later in this document, the eventual response is a NOTIFY method indicating that there has been a change in status VoLTE Call UE Invite SDP EPC & IMS 100 Trying 180 Ringing PRACK 200 OK 200 OK (SDP Answer) ACK The initial stages of setting up a VoLTE call are the processes of the initial attach, P-CSCF discovery and creating the default bearer for SIP signaling (by registering with the IMS network and subscribing to a registration event package). The first step in a VoLTE call setup is a SIP INVITE request initiated by the calling UE. Following this step, agreement is made on the media-specific parameters such as codecs (e.g. AMR or WB-AMR). After some RINGING, TRYING and OK messaging, the calling UE may respond with a Provisional ACK (PRACK) method as shown in the flow diagram above and as defined in RFC The PRACK method is used because ACK cannot safely traverse proxy servers that comply with RFC The PRACK is also forwarded to the called UE. When the called subscriber answers the call, the called UE will respond with a 200 OK before the RTP (media) messaging begins. 8 REFERENCE GUIDE
10 In a VoLTE call, the bearer is associated with a QoS Class Identifier (QCI) of 1. QCI values from the 3GPP s TS are shown in Table 1. Each is generally targeted to a specific service type based on delay and packet loss requirements. For example, a video telephony call might add a second dedicated bearer for video traffic, assigning a QCI of 6 to that bearer. QCI Resource Type Priority Packet Delay Budget (ms) Packet Error Loss Rate 1 GBR Conversational Voice Example Services 2 GBR Conversational Video (live streaming) 3 GBR Non-conversational video (buffered streaming) 4 GBR Real-time gaming 5 Non-GBR IMS Signaling 6 Non-GBR Voice, Video (live streaming), interactive gaming 7 Non-GBR Video (buffered streaming) 8 Non-GBR TCP-based (WWW, , FTP); privileged subscriber 9 Non-GBR TCP-based (WWW, , FTP); non-privileged subscriber Table 1 - QCI Values for Bearers 4. IMS PROTOCOLS From the UE s point of view of the IMS subsystem, the critical protocols are the Session Initiation Protocol (SIP), SigComp, Real-time Transport Protocol (RTP), RTP Control Protocol (RTCP) and IP Security (IPSec). While there are other key IMS protocols (e.g. Diameter) often mentioned in the same breath as those listed here, these are the ones impacted by the UE or having direct impact on UE operation SIP SIP is a protocol used to create, modify and terminate multimedia sessions, essentially negotiating a media session between two users. As a text-based client/server protocol, SIP is completely independent of underlying protocols, (e.g. TCP/IP vs. UDP or IPv4 vs. IPv6). SIP is not a transport protocol and does not actually deliver media, leaving that task to RTP/RTCP. While SIP itself is defined in the IETF s RFC , SIP as used for IMS includes multiple extensions. This is not without precedent in telephony; one popular implementation of Push-to-talk over Cellular (PoC) used a heavilyextended version of SIP as well. As a matter of fact, some better-known cellular SIP methods (e.g. MESSAGE, SUBSCRIBE) are actually defined in extensions beyond RFC 3261, and their usage in cellular IMS is defined in the 3GPP s TS One popular misconception is that SIP is specific to IMS. In fact, it is used in media services deployed via Internet PDN as well. Skype and FaceTime are two well-known examples of non-ims-based SIP-based applications. 2 3GPP TS : Policy and charging control architecture 3 Internet Engineering Task Force (IETF) RFC 3261: SIP: Session Initiation Protocol 4 3GPP TS : IP Multimedia Subsystem (IMS); Stage 2 REFERENCE GUIDE 9
11 IMS Procedures and Protocols The LTE User Equipment Perspective 4.2. SIP requests SIP is a sequential (request/response) protocol similar to HTTP both in functionality and format. Every SIP request begins with a starting line that includes the name of the method (request type). Table 2 outlines request methods used in SIP. SIP Request Method Description Definition INVITE Indicates that a client is being invited to participate in a call session RFC 3261 ACK Confirms that the client has received a final response to an INVITE request RFC 3261 BYE Terminates a call; can be sent by either the caller or the called party RFC 3261 CANCEL Cancels any pending request RFC 3261 OPTIONS Queries the capabilities of servers RFC 3261 REGISTER Registers the address listed in the To header field with a SIP server RFC 3261 PRACK Provisional acknowledgement RFC SUBSCRIBE Subscribes to event notification RFC NOTIFY Notifies the subscriber of a new Event RFC 3265 PUBLISH Publishes an event to the Server RFC INFO Sends mid-session information that does not modify the session state RFC REFER Asks recipient to issue a SIP request (call transfer) RFC MESSAGE Transports instant messages using SIP RFC UPDATE Modifies the state of a session without changing the state of the dialog RFC Table 2 - SIP Request Methods The first line of a SIP request is followed by header information, and finally the message body. RFC 3261 not only defines SIP but includes a very reader-friendly description of the fields found in the request header. Please refer to the Appendix for a complete list of SIP Headers. The content of the message body is defined by the Session Description Protocol defined in RFC and described in the next section. 5 Internet Engineering Task Force (IETF) RFC 3262: Reliability of Provisional Responses in the Session Initiation Protocol (SIP) 6 Internet Engineering Task Force (IETF) RFC 3265: Session Initiation Protocol (SIP)-Specific Event Notification 7 Internet Engineering Task Force (IETF) RFC 3903: Session Initiation Protocol (SIP) Extension for Event State Publication 8 Internet Engineering Task Force (IETF) RFC 6086: Session Initiation Protocol (SIP) INFO Method and Package Framework 9 Internet Engineering Task Force (IETF) RFC 3515: The Session Initiation Protocol (SIP) Refer Method 10 Internet Engineering Task Force (IETF) RFC 3428: Session Initiation Protocol (SIP) Extension for Instant Messaging 11 Internet Engineering Task Force (IETF) RFC 3311: The Session Initiation Protocol (SIP) UPDATE Method 12 Internet Engineering Task Force (IETF) RFC 2327: SDP: Session Description Protocol 10 REFERENCE GUIDE
12 Request start line INVITE SIP/2.0 Request header Via: SIP/2.0/UJP :5060;branch=z9hG4bK343b:628;rport From: Test 15 To: Contact : <sip:15@ > Call-ID: c80e17e6c:6c29861eb2933@ CSeq: 102 INVITE User-Agent : Asterisk PBX Max-Forwards : 70 Date: Wed, 06 Dec :12 :45 GY.T Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Type : application/adp Content-Length: 258 <blank line> Message body v=0 (SDP message) o=joe Spirent IN IP s=spirent Seminar : IMS & VoLTE c=in IP t=0 0 m=audio RTP/AVP a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp: a=silencesupp:off a=ptime:20 a=sendrecv Table 3 - Sample SIP request 4.3. Session Description Protocol (SDP) The definition of SDP in RFC 2327 was cast in the late 1990 s and was originally intended for use in describing multimedia (e.g. audio, video) sessions on an Internet backbone. At a minimum, a multimedia session requires the following information to be shared between the sender and the receiver: the name of the session, the time(s) at which the session is active, information regarding the media and information required to receive the media (i.e., addresses, ports, formats, etc.) SDP information may also include contact information and information about bandwidth requirements for the session. While RFC 2327 defines the fields used in SDP, the protocol mechanism or negotiation is defined in RFC This basic mechanism itself is familiar to the cellular world, with one participant suggesting a common basis for communication and another responding with a suggestion suited to its own capabilities. At a minimum this offer/answer mechanism is used to negotiate media formats and transport addresses. It may also be used to exchange cryptographic keys and algorithms. In Table 2, the SDP message body describes the owner ( Joe Spirent ), the session ( Spirent Seminar: IMS & VoLTE ), some connection information (IP ), the media (audio) and some suggested attributes of the media (PCMU, PCMA, etc.). 13 Internet Engineering Task Force (IETF) RFC 3264: An Offer/Answer Model with the Session Description Protocol (SDP) REFERENCE GUIDE 11
13 IMS Procedures and Protocols The LTE User Equipment Perspective 4.4. SIP Responses SIP Responses are maintained in an IANA list called Session Initiation Protocol (SIP) Parameters 14. They always begin with a Response Code, which falls into one of the following categories: Informational/Provisional (1xx): Request received and being processed Examples: 100 Trying, 180 Ringing Successful (2xx): The action was successfully received, understood, and accepted Examples: 200 OK, 202 Accepted Redirection (3xx): Further action needs to be taken (typically by the sender) to complete the request Examples: 301 Moved Permanently, 302 Moved Temporarily Client Failure (4xx): The request contains bad syntax or cannot be fulfilled at the server Examples: 401 Unauthorized, 403 Forbidden Server Failure (5xx): The server failed to fulfill an apparently valid request Examples: 500 Server Internal Error, 504 Server Time-out Global Failure (6xx): The request cannot be fulfilled at any server Examples: 600 Busy Everywhere, 604 Does Not Exist Anywhere Please refer to the Appendix for a complete list of SIP Codes SigComp (Signaling Compression) SIP is, like HTTP, a text-based protocol. While this can make for easy debugging it is inefficient when used in its native text form. The compression mechanism used is SigComp, defined in RFC SigComp is not specific to IMS and, contrary to popular belief, does not define a specific algorithm. Rather it defines an architecture in which to deploy a compression/decompression algorithm, including the definition for a Universal Decompressor Virtual Machine (UDVM). While this architecture enables virtually any available lossless compression algorithm, IMS centers on using either the DEFLATE algorithm or the well-known Lempel-Ziv-Storer-Szymanski (LZSS) algorithm. While both DEFLATE and LZSS started their lives as commercial products, the patents on DEFLATE have expired and the algorithm has since been codified in an IETF document (RFC ). Two noteworthy points: first, SigComp is only implemented between a UE and the network s P-CSCF. Secondly, SMS-only IMS devices do not use SigComp Internet Engineering Task Force (IETF) RFC 3320: Signaling Compression (SigComp) 16 Internet Engineering Task Force (IETF) RFC 1951: DEFLATE Compressed Data Format Specification 12 REFERENCE GUIDE
14 4.6. The Real-time Transport Protocol (RTP) and RTP Control Protocol (RTCP) It was noted earlier that while SIP is the most commonly mentioned protocol when discussing IMS, SIP is not a media transport protocol. IMS uses RTP as the media data transfer protocol. Both RTP and RTCP are defined in RFC Despite the protocol s name, neither RTP nor RTCP make any attempt to guarantee timeliness of data delivery. On the contrary, the phrase real-time is used because a pre-requisite for RTP is an architectural framework whose lower layers can deliver real-time data. In an IMS scenario, RTCP is used to provide statistical Quality-of-Service (QoS) information and aid in synchronizing streams. While the protocol can be used to provide other rudimentary connection information, an IMS subsystem uses SDP for this purpose. RTP and RTCP are always paired in port assignments. An even-numbered port will become an RTP port, and the next highest-number port will be the associated RTCP port. Figure 3 - IMS media is transported by RTP/RTCP 5. IMS CLIENT-RELATED SECURITY IMS clients are challenged at various points by the network: on initial registration, on de-registration, and on certain session requests (e.g. SIP INVITE). The mechanism used is Authentication and Key Agreement (IMS AKA) with IPsec. In terms of access security (managed in part by the UE or UE-hosted elements), of the five documented security associations in the 3GPP s TS document, two are related to direct connections between the UE and the IMS subsystem. Note that the topic of network security (security between nodes in the network) is beyond the scope of this document. While there are other security associations related to the UE, these are meant to protect nodes within the subsystem. From a more macroscopic point of view, the security associations discussed here are independent of those required by legacy networks and non-ims packet data systems. 17 Internet Engineering Task Force (IETF) RFC 3550: RTP: A Transport Protocol for Real-Time Applications 18 3GPP TS : Technical Specification Group Services and System Aspects; 3G security; Access security for IP-based services REFERENCE GUIDE 13
15 IMS Procedures and Protocols The LTE User Equipment Perspective 5.1. Security association between the User Agent and a P-CSCF This security association occurs on the Gm reference point defined in TS The mechanism call flow is outlined in Figure 3 and described in detail in the document section titled Sample SIP Call Flows starting on page 15. This initial call flow uses an unprotected port on the network side. UE NETWORK Shared Secret Data (SSD) Stored at UE (e.g. ISIM) Shared Secret Data (SSD) Stored at Network (e.g. HSS) Calculate expected response using MD5 (SSD + nonce) Calculate response using MD5 (SSD + nonce) Compare expected and actual response values Figure 4 - IMS Authentication In transport mode, data traffic between the UE and the P-CSCF is protected by IPsec Encapsulating Security Payloads (ESP) Security association between the ISIM and the HSS The second security association discussed here is between the ISIM and the HSS. This association uses IMS Authentication and Key Agreement (IMS-AKA) to provide mutual authentication between the ISIM and the home network. Note that the User Agent P-CSCF association does not use IMS-AKA since no key is shared; that mechanism assumes that shared secret data is stored on both the network and the UE. 19 3GPP TS : Technical Specification Group Services and System Aspects; Network Architecture 14 REFERENCE GUIDE
16 6. SAMPLE SIP CALL FLOWS The following section illustrates the above with some examples as seen from the UE s perspective Registration First, the User Agent (UA) on the UE attempts to register with the IMS subsystem using an unauthenticated registration attempt. Here, sip:spirentims.com is the Request-URI. Note that the client uses valid abbreviations for the from ( f ) and to ( t ) parameters. Note also that the addresses in these two fields are identical. This is, in fact, usually the case. Finally, take note that SIP header abbreviations are not always as intuitive as they are for from and to. For example, k abbreviates Supported and the abbreviation for Identity is y. In multiple designs this relatively simple detail has raised issues that were not discovered until interoperability testing. REGISTER sip:spirentims.com f: <sip: @spirentims.com>;tag= t: <sip: @spirentims.com> CSeq: REGISTER i: _ @2600:1000:800a:92e0:0:2:c33c:b501 v: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Max-Forwards: 70 m: <sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060> P-Access-Network-Info: 3GPP-E-UTRAN-FDD; utran-cell-id-3gpp=025b l: 0 Authorization: Digest uri= sip:spirentims.com,username= @spirentims.com,response=,realm=\ spirentims.com,nonce= Expires: 3600 The from and to fields show examples of SIP URIs, including 10-digit MINs built from the UE s public identities. The network s response (below) is the expected 401 response. It contains the nonce (= C/0d2Rb ) that will be hashed with the SSD by the UE. The response also specifies the algorithm to be used, in this case AKAv2 (defined in RFC ) with MD5 hashing. Note also that the network is not using abbreviations for from and to. 401 Unauthorized From: <sip: @spirentims.com>;tag= To: <sip: @spirentims.com>;tag= CSeq: REGISTER Call-ID: _ @2600:1000:800a:92e0:0:2:c33c:b501 Via: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK WWW-Authenticate: Digest realm= spirentims.com,nonce= C/0d2RbSENwLBtfXG2d+EoZTHcoQtAAAM1EyTNicLIMyM DJiMTExAA==,\ algorithm=akav2-md5,qop= auth Content-Length: 0 20 Internet Engineering Task Force (IETF) RFC 4169: Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2 REFERENCE GUIDE 15
17 IMS Procedures and Protocols The LTE User Equipment Perspective The client replies with a response that includes the hashed value ( response ) and includes an echo of the nonce. REGISTER sip:spirentims.com SIP/2.0 f: <sip: @spirentims.com>;tag= t: <sip: @spirentims.com> CSeq: REGISTER i: _ @2600:1000:800a:92e0:0:2:c33c:b501 v: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Max-Forwards: 70 m: <sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060> P-Access-Network-Info: 3GPP-E-UTRAN-FDD; utran-cell-id-3gpp=025b l: 0 Authorization: Digest username= @spirentims.com,\ realm= spirentims.com,uri= sip:spirentims. com,qop=auth,\ nonce= C/0d2RbSENwLBtfXG2d+EoZTHcoQtAAAM1EyTNicLIMyMDJiMTExAA==,nc= ,cnonce= ,\ algorithm=akav2-md5,response= ae1cbf6463baa6dfb7dc59a7fdea8ad Expires: 3600 The network, having checked the hashed response against the result of its own hashing, sends a 200 response: 200 OK From: <sip: @spirentims.com>;tag= To: <sip: @spirentims.com>;tag= CSeq: REGISTER Call-ID: _ @2600:1000:800a:92e0:0:2:c33c:b501 Via: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Contact: <sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060>;expires=3600 P-com.siemens.maximum-chat-size: 1300 P-com.siemens.maximum-IM-size: 1300 P-com.siemens.chat: direct P-Associated-URI: <sip: @spirentims.com> P-Associated-URI: <tel: > Content-Length: 0 Initial IMS registration is now complete REFERENCE GUIDE
18 6.2. Event Subscription Here, the type of event is a reg event. The abbreviation o as a header field means Event yet another example of a non-intuitive header field abbreviation. Note the Expires field setting up the subscription for 600,000 seconds. SUBSCRIBE sip: @spirentims.com SIP/2.0 f: <sip: @spirentims.com>;tag= t: <sip: @spirentims.com> CSeq: SUBSCRIBE i: _ @2600:1000:800a:92e0:0:2:c33c:b501 v: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Max-Forwards: 70 m: <sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060> P-Access-Network-Info: 3GPP-E-UTRAN-FDD; utran-cell-id-3gpp=025b o: reg l: 0 Route: <sip:[2001:4888:2:fff0:a0:104:0:37]:5060;lr> P-Preferred-Identity: <sip: @spirentims.com> Expires: The network replies with a 200 (OK) response: 200 OK From: <sip: @spirentims.com>;tag= To: <sip: @spirentims.com>;tag= CSeq: SUBSCRIBE Call-ID: _ @2600:1000:800a:92e0:0:2:c33c:b501 Via: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Expires: Contact: <sip:njbbims1scscf040.spirentims.com:5090;lskpmc=s20> Record-Route: <sip:[2001:4888:2:fff0:a0:104:0:37];routing_id=pcscf_a_side;lskpmc=p12;lr;serv_user=[2600:1000:800a:92e0: 0:2:c33c:b501]:5060> Content-Length: 0 The network now wants to notify the UA of a change in registration status, using the NOTIFY method. NOTIFY sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060 SIP/2.0 Via: SIP/2.0/UDP [2001:4888:2:fff0:a0:104:0:37]:5060;branch=z9hG4bK57c9c140bcda4a610df85cd53f7a754b;lskpmc=P12 Record-Route: <sip:[2001:4888:2:fff0:a0:104:0:37];routing_id=pcscf_a_side;lskpmc=p12;lr> From: <sip: @spirentims.com>;tag= To: <sip: @spirentims.com>;tag= Event: reg Call-ID: _ @2600:1000:800a:92e0:0:2:c33c:b501 Subscription-State: active CSeq: 1 NOTIFY Content-Type: application/reginfo+xml Contact: <sip:njbbims1scscf040.spirentims.com:5090;lskpmc=s20> Max-Forwards: 68 Content-Length: 613 Message Body extensible Markup Language REFERENCE GUIDE 17
19 IMS Procedures and Protocols The LTE User Equipment Perspective Extracting the XML message body reveals two separate addresses of record in the lines beginning with aor=. The first is the sip-uri (defined in RFC 3261) originally used in the registration. The second is a tel-uri (defined in RFC ). In this case the information provided seems redundant, but there is a reason for this distinction. If a PSTN user needs to call the UE, the device connected to the PSTN probably has no concept of SIP or its usage. It will, however, be able to call using the standard 10-digit E.164 telephone number provided in the tel-uri. This allows a circuit-switched device to communicate with the UE. The CSCF initiated this action (creating the telephone number) and then notified the UA because the UA had SUBSCRIBEd to being notified of changes in registration status. <?xml version= 1.0?> <reginfo xmlns= urn:ietf:params:xml:ns:reginfo xmlns:xsi= version= 0 state= full > <registration aor= sip: @spirentims.com id= ecc state= active > <contact id= state= active event= registered > <uri> sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060 </uri> </contact> </registration> <registration aor= tel: id= 575a5d0a state= active > <contact id= state= active event= created > <uri> sip: @[2600:1000:800a:92e0:0:2:c33c:b501]:5060 </uri> </contact> </registration> </reginfo> 21 Internet Engineering Task Force (IETF) RFC 3966: The tel URI for Telephone Numbers 18 REFERENCE GUIDE
20 Finally, the UA sends its own 200 (OK) response and the exchange is complete: 200 OK Via: SIP/2.0/UDP [2001:4888:2:fff0:a0:104:0:37]:5060;branch=z9hG4bK57c9c140bcda4a610df85cd53 f7a754b;lskpmc=p12 Record-Route: <sip:[2001:4888:2:fff0:a0:104:0:37];routing_id=pcscf_a_side;lskpmc=p12;lr> From: To: Call-ID: CSeq: 1 NOTIFY l: 0 P-Access-Network-Info: 3GPP-E-UTRAN-FDD; utran-cell-id-3gpp=025b VoLTE Call In this example, one user will invite another UE to a VoLTE call with a SIP INVITE request containing the SDP offer (starting after the blank line) in its body: INVITE sip:+1102@fd00:0:20:1:0:0:1:2 SIP/2.0 Via: SIP/2.0/UDP [fd00:0:0:1::1]:5060;branch=z9hg4bk smg;transport=udp Supported: 100rel,timer Allow: INVITE, ACK, CANCEL, UPDATE, BYE P-Access-Network-Info: 3GPP-E-UTRAN-FDD;utran-cell-id-3gpp= P-com.HDVVServiceType: VZW2012 User-Agent: SP VOIP IMS 2.0 Session-Expires: 1800;refresher=uac Content-Type: application/sdp Route: <sip:[fd00:0:20:1:0:0:1:2]:5060;lr> Accept-Contact: *;+g.3gpp.icsi-ref= urn%3aurn-7%3a3gpp-service.ims.icsi.mmtel From: <sip: @spirentims.com>;tag= To: <sip:+1102@fd00:0:20:1:0:0:1:2> Call-ID: @fd00:0:0:1::1 CSeq: 1 INVITE Max-Forwards: 70 Contact: <sip:[fd00:0:0:1::1]:5060;transport=udp>;+g.3gpp.icsi-ref= urn%3aurn-7%3a3gpp-service.ims. icsi.mmtel Content-Length: 396 v=0 o=ims-ue-for IN IP6 fd00:0:0:1::1 s=i=a VOIP Session c=in IP6 fd00:0:0:1::1 t=0 0 m=audio RTP/AVP b=as:49 b=rs:800 b=rr:2400 a=ptime:20 a=maxptime:20 a=rtpmap:107 AMR-WB/16000 a=fmtp:107 octet-align=1; mode-set=2 a=rtpmap:97 AMR/8000 a=fmtp:97 octet-align=1; mode-set=7 a=rtpmap:110 telephone-event/8000 a=fmtp: a=mid:0 a=sendrecv REFERENCE GUIDE 19
21 IMS Procedures and Protocols The LTE User Equipment Perspective Here the UE offers a number of media and codec options to use during the call. Some of the details are described below. Some static RTP payload type values are assigned standard values defined in RFC , but most interesting codecs are newer than the standard and therefore rely on the use of dynamic RTP payload type assignments. Dynamically assigned payload type values can be instantly recognized their values are greater than 96. This sometimes causes confusion. Some implementations will consistently use a specific payload type code for a specific codec, leading to the belief that all payload type values are standardized. v= Version v=0 (at the time of the writing of this document, 0 is the only valid value o= Session owner & ID o=<username> <session id> <version> <network type> <address type> <address> s= Session name s=<session name> i= A VOIP Session i=<session description> c= Connection information c=<nettype> <addrtype><connection-address> t= Time the session is active t=<starttime> <stoptime> - non-zero for scheduled events m= media type, format and transport address b= AS:49 b=<bandwidth type><bandwidth> m=<media> <port> <transport> <format list> <media> is audio or video (two m= lines for both). This is a prioritized list, where the first media type is the preferred type. a= session attributes a=<attribute> or a=<attribute> <value> Table 4 - Details on the SIP INVITE SDP ptime rtpmap fmtp mid sendrecv a=ptime:<packet time> Length (in ms) carried in one RTP packet a=rtpmap:<payload type> <encoding name>/<clock rate> [/<encoding parameters>] Mapping from RTP payload codes (from the <format list> in the m= field) to a codec name, clock rate and other encoding parameters a=fmtp:<format> <format specific parameters>defines parameters that are specific to a given format code a=mid:<identification-tag> Normally used when media lines have to be typed together to indicate interaction between media types (e.g. audio and video). Defined in RFC a=sendrecv (or sendonly, recvonly, inactive, broadcast ) Table 5 - Details on Session Attributes 22 Internet Engineering Task Force (IETF) RFC 3551: RTP Profile for Audio and Video Conferences with Minimal Control 23 Internet Engineering Task Force (IETF) RFC 3388: Grouping of Media Lines in the Session Description Protocol (SDP) 20 REFERENCE GUIDE
22 From the network s point of view, the next step is for the CSCF (which has received the INVITE request) to forward the request to the UE the caller is attempting to reach. That UE may first reply with a 100 TRYING response, then with a 180 RINGING response, both of which the CSCF forwards to the calling UE: 100 Trying Via: Via: SIP/2.0/UDP [fd00:0:0:1::1]:5060;branch=z9hg4bk smg;transport=udp To: <sip:+1102@fd00:0:20:1:0:0:1:2> From: <sip: @spirentims.com>;tag= Call-ID: @fd00:0:0:1::1 CSeq: 1 INVITE User-Agent: SP VOIP IMS 2.0 Content-Length: Ringing Via: SIP/2.0/UDP [fd00:0:0:1::1]:5060;branch=z9hg4bk smg;transport=udp Contact: <sip:[fd00:0:0:1::1]:5060;transport=udp> To: <sip:+1101@fd00:0:20:1:0:0:1:2>;tag= c From: <sip: @spirentims.com>;tag= Call-ID: @fd00:0:0:1::1 CSeq: 1 INVITE User-Agent: SP VOIP IMS 2.0 Content-Length: 0 Once the called subscriber answers the call, the called UE will respond with a 200 (OK): 200 OK Via: SIP/2.0/UDP [fd00:0:0:1::1]:5060;branch=z9hg4bk smg;transport=udp Contact: <sip:[fd00:0:0:1::1]:5060;transport=udp> To: <sip:+1101@fd00:0:20:1:0:0:1:2>;tag= c From: <sip: @spirentims.com>;tag= Call-ID: @fd00:0:0:1::1 CSeq: 1 INVITE Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE Content-Type: application/sdp Supported: replaces User-Agent: SP VOIP IMS 2.0 Content-Length: 407 v=0 s=i=a VOIP Session t=0 0 m=audio 4900 RTP/AVP b=as:49 b=rs:800 b=rr:2400 a=ptime:20 a=maxptime:20 a=rtpmap:107 AMR-WB/16000 a=fmtp:107 octet-align=1; mode-set=2 a=rtpmap:97 AMR/8000 a=fmtp:97 octet-align=1; mode-set=7 a=rtpmap:110 telephone-event/8000 a=fmtp: a=mid:0 a=sendrecv REFERENCE GUIDE 21
23 IMS Procedures and Protocols The LTE User Equipment Perspective From this point forward VoLTE traffic is transacted in the form of RTP messages and associated ACK/NACK signaling. What has happened from the network s point of view is that one UE, which may have already been using the Internet PDN as a default bearer (per the operator s preference), issued an INVITE (via the default bearer) to IMS. The called UE was contacted, answered and issued an SDP answer. This caused the S-CSCF to request that the PCRF establish a dedicated IMS bearer to transport RTP traffic SMS Suppose the UE initiates a text message. The UA initiates the transaction using the MESSAGE method, an extension defined in RFC The to field now includes the URI for the intended recipient UE. The message body is an IS-637-A message, the same payload data (not shown here) as might be found in a 1X text message. The payload could have just as easily been formatted as per a GSM text message. MESSAGE tel: ;phone-context=spirentims.com SIP/2.0 f: UML290 <sip: @spirentims.com>;tag= t: <tel: ;phone-context=spirentims.com> CSeq: MESSAGE i: _ @2600:1000:800a:92e0:0:2:c33c:b501 v: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK Max-Forwards: 70 P-Access-Network-Info: 3GPP-E-UTRAN-FDD; utran-cell-id-3gpp=025b Route: <sip:[2001:4888:2:fff0:a0:104:0:37]:5060;lr> c: application/vnd.3gpp2.sms Allow: MESSAGE Request-Disposition: no-fork User-Agent: QC User Agent l: 62 ANSI IS-637-A (SMS) Transport Layer - Point-to-Point ANSI IS-637-A (SMS) Teleservice Layer - CDMA Cellular Messaging Teleservice (4098) Here, the message body is broken down to show the IS-637-A fields, including the encoded user data (in bold): 22 REFERENCE GUIDE
24 ANSI IS-637-A (SMS) Transport Layer - Point-to-Point Teleservice Identifier - CDMA Cellular Messaging Teleservice (4098) Transport Param ID: Teleservice Identifier (0) Length: 2 CDMA Cellular Messaging Teleservice (4098) Destination Address Transport Param ID: Destination Address (4) Length: : Digit mode: 4-bit DTMF : Number mode: ANSI T : Number of fields (MSB): (10) : Number of fields (LSB) Number: : Reserved Bearer Data Transport Param ID: Bearer Data (8) Length: 46 Bearer Data ANSI IS-637-A (SMS) Teleservice Layer - CDMA Cellular Messaging Teleservice (4098) Message Identifier Teleservice Subparam ID: Message Identifier (0) Length: = Message Type: Submit (mobile-originated only) (2) = Message ID: = Reserved: 0 User Data Teleservice Subparam ID: User Data (1) Length: : Encoding: 7-bit ASCII : Number of fields (MSB): : Number of fields (LSB) : Most significant bits of first field Encoded user data: Spirent s IMS Solution (2nd to None!!!) : Reserved Validity Period - Relative Teleservice Subparam ID: Validity Period - Relative (5) Length: 1 Days The CSCF now sends a 200 (OK) to indicate that it has received the SIP request. Note that this does not reflect any information about whether the message was delivered, read or received. 200 OK Via: SIP/2.0/UDP [2600:1000:800a:92e0:0:2:c33c:b501]:5060;branch=z9hG4bK To: <tel: ;phone-context=spirentims.com>;tag=notag From: UML290 <sip: @spirentims.com>;tag= Call-ID: _ @2600:1000:800a:92e0:0:2:c33c:b501 CSeq: MESSAGE Allow: INVITE,ACK,CANCEL,BYE,INFO,UPDATE,MESSAGE,NOTIFY Content-Length: 0 REFERENCE GUIDE 23
25 IMS Procedures and Protocols The LTE User Equipment Perspective 7. CONCLUSION The IMS subsystem is a critical factor in the deployment of next-generation services. UE development today requires an understanding of the essential mechanisms used to interface with the subsystem. This paper presented the key protocols and procedures used by an LTE-capable UE when interfacing with an IMS-based LTE network. Much of the focus was on SIP and its use in registration, event subscription and VoLTE call connection. Some detailed protocol exchanges, captured from a live network, were used to illustrate the concepts. The designer of a modern UE faces challenges on several fronts, not the least of which is an interface to an entirely new subsystem. As a global leader in LTE device testing, Spirent is well prepared to assist the UE developer address the many IMS/VoLTE test challenges and to support the industry in successful deployment of IMS/VoLTE. Please see the Spirent website ( for other free white papers, recorded seminars, posters and other resources that may be helpful to the UE developer REFERENCE GUIDE
26 8. APPENDIX 8.1. SIP Headers Header field Abbreviation Reference Accept Accept-Contact a RFC3841 Accept-Encoding Accept-Language Accept-Resource-Priority RFC4412 Alert-Info Allow Allow-Events u RFC3265 Answer-Mode RFC5373 Authentication-Info Authorization Call-ID* i Call-Info Contact m Content-Disposition Content-Encoding e Content-Language Content-Length l Content-Type c CSeq* Date Encryption** Error-Info Event o RFC3265 Expires Flow-Timer RFC5626 From* f Hide** RFC4244 History-Info RFC6044 Identity y RFC4474 Identity-Info n RFC4474 In-Reply-To Join RFC3911 Max-Breadth RFC5393 Max-Forwards* MIME-Version Min-Expires Min-SE RFC4028 Organization P-Access-Network-Info RFC3455 P-Answer-State RFC4964 P-Asserted-Identity RFC3325 P-Asserted-Service RFC6050 P-Associated-URI RFC3455 P-Called-Party-ID RFC3455 P-Charging-Function-Addresses RFC3455 * Mandatory ** Deprecated REFERENCE GUIDE 25
27 IMS Procedures and Protocols The LTE User Equipment Perspective Header field Abbreviation Reference P-Charging-Vector RFC3455 P-DCS-Billing-Info RFC5503 P-DCS-LAES RFC5503 P-DCS-OSPS RFC5503 P-DCS-Redirect RFC5503 P-DCS-Trace-Party-ID RFC3603 P-Early-Media RFC5009 P-Media-Authorization RFC3313 P-Preferred-Identity RFC3325 P-Preferred-Service RFC6050 P-Profile-Key RFC5002 P-Refused-URI-List RFC5318 P-Served-User RFC5502 P-User-Database RFC4457 P-Visited-Network-ID RFC3455 Path RFC3327 Permission-Missing RFC5360 Policy-Contact Policy-ID Priority Priv-Answer-Mode RFC5373 Privacy RFC3323 Proxy-Authenticate Proxy-Authorization Proxy-Require RAck RFC3262 Reason RFC3326 Record-Route Refer-Sub RFC4488 Referred-By RFC3892 Replaces RFC3891 Resource-Priority RFC4412 Response-Key** Retry-After Route RSeq RFC3262 Security-Client RFC3329 Security-Server RFC3329 Security-Verify RFC3329 Server Service-Route RFC3608 Session-Expires x RFC4028 SIP-ETag RFC3903 SIP-If-Match RFC3903 Subject s Subscription-State RFC3265 Supported k Suppress-If-Match RFC5839 ** Deprecated 26 REFERENCE GUIDE
28 Header field Abbreviation Reference Target-Dialog RFC4538 Timestamp To* t Trigger-Consent RFC5360 Unsupported User-Agent Via* v Warning WWW-Authenticate 8.2. SIP Codes Code Description Reference 100 Trying 180 Ringing 181 Call Is Being Forwarded 182 Queued 183 Session Progress 199 Early Dialog Terminated RFC OK 202 Accepted RFC No Notification RFC Multiple Choices 301 Moved Permanently 302 Moved Temporarily 305 Use Proxy 380 Alternative Service 400 Bad Request 401 Unauthorized 402 Payment Required 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 408 Request Timeout 410 Gone 412 Conditional Request Failed RFC Request Entity Too Large 414 Request-URI Too Long 415 Unsupported Media Type 416 Unsupported URI Scheme 417 Unknown Resource-Priority RFC Bad Extension 421 Extension Required 422 Session Interval Too Small RFC Interval Too Brief 424 Bad Location Information RFC Use Identity Header RFC4474 * Mandatory REFERENCE GUIDE 27
29 IMS Procedures and Protocols The LTE User Equipment Perspective Code Description Reference 422 Session Interval Too Small RFC Interval Too Brief 424 Bad Location Information RFC Use Identity Header RFC Provide Referrer Identity RFC Flow Failed RFC Anonymity Disallowed RFC Bad Identity-Info RFC Unsupported Certificate RFC Invalid Identity Header RFC First Hop Lacks Outbound Support RFC Max-Breadth Exceeded RFC Bad Info Package RFC Consent Needed RFC Temporarily Unavailable 481 Call/Transaction Does Not Exist 482 Loop Detected 483 Too Many Hops 484 Address Incomplete 485 Ambiguous 486 Busy Here 487 Request Terminated 488 Not Acceptable Here 489 Bad Event RFC Request Pending 493 Undecipherable 494 Security Agreement Required RFC Server Internal Error 501 Not Implemented 502 Bad Gateway 503 Service Unavailable 504 Server Time-out 505 Version Not Supported 513 Message Too Large 580 Precondition Failure RFC Busy Everywhere 603 Decline 604 Does Not Exist Anywhere 606 Not Acceptable 28 REFERENCE GUIDE
30 9. ACRONYMS ACK ACKnowledge CSCF Call Session Control Function DCCH Dedicated Control Channel DHCP Dynamic Host Configuration Protocol EPS Evolved Packet System ESM EPS Session Management FQDN Fully Qualified Domain Name GBR Guaranteed Bit Rate HSS Home Subscriber Server IANA Internet Assigned Numbers Authority I-CSCF Interrogating Call Session Control Function IMS IP Multimedia Subsystem IMS AKA IMS Authentication and Key Agreement Inter-RAT Inter-Radio Access Technology IPSec IP Security ISIM IP Multimedia Services Identity Module LZSS Lempel-Ziv-Storer-Szymanski MIB Master Information Block MME Mobility Management Entity NAS Non-Access Stratum P-CSCF Proxy- Call Session Control Function PDN Packet Data Network PRACK Provisional ACK QCI QoS Class Identifiers QoS Quality-of-Service RRC Radio Resource Control RTCP RTP Control Protocol RTP Real-time Transport Protocol S-CSCF Serving Call Session Control Function SDP Session Description Protocol SIB System Information Block SIP Session Initiation Protocol SMS Short Message Service SSD Shared Secret Data UA User Agent UDVM Universal Decompressor Virtual Machine UE User Equipment URI Uniform Resource Identifier USIM UMTS Subscriber Identity Module VoLTE Voice over LTE REFERENCE GUIDE 29
31 AMERICAS EUROPE AND THE MIDDLE EAST +44 (0) ASIA AND THE PACIFIC Spirent. All Rights Reserved. All of the company names and/or brand names and/or product names referred to in this document, in particular, the name Spirent and its logo device, are either registered trademarks or trademarks of Spirent plc and its subsidiaries, pending registration in accordance with relevant national laws. All other registered trademarks or trademarks are the property of their respective owners. The information contained in this document is subject to change without notice and does not represent a commitment on the part of Spirent. The information in this document is believed to be accurate and reliable; however, Spirent assumes no responsibility or liability for any errors or inaccuracies that may appear in the document. Rev B. 03/14
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or
About this Tutorial SIP is a signalling protocol designed to create, modify, and terminate a multimedia session over the Internet Protocol. It is an application layer protocol that incorporates many elements
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
3GPP TS 24.605 V8.1.0 (2008-09)
TS 24.605 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Conference (CONF) using IP Multimedia (IM) Core Network
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
Test Cases - IMS Profile for Voice and SMS
IMS Activity Group Test Cases - IMS Profile for Voice and SMS Version 1.0 29 December 2011 IMTC_Test_Cases IMTC IMS AG Page 1 of 34 History Version Date Name Reason 1.0 15-08-2011 Bo Jönsson Version 0.12
ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification
TS 124 238 V8.2.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Session Initiation Protocol (SIP) based user configuration; Stage 3 (3GPP TS 24.238 version 8.2.0
SIP Trunking. Service Guide. www.megapath.com. Learn More: Call us at 877.634.2728.
Service Guide Learn More: Call us at 877.634.2728. www.megapath.com What is MegaPath SIP Trunking? SIP Trunking enables your business to reduce costs and simplify IT management by combining voice and Internet
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem
GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback.
SIP Messages 100 Trying This response indicates that the request has been received by the next-hop server and that some unspecified action is being taken on behalf of this call (for example, a database
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
NGN NNI Signalling Profile
/ ATIS Workshop Next Generation Technology and Standardization NGN NNI Signalling Profile Takumi hba NTT Co-editor of Q.NNI_profile What is a signalling profile? o Purpose of signalling profile Higher
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. [email protected]
VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 [email protected] 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy
For internal circulation of BSNL only
E1-E2 E2 CFA Session Initiation Protocol AGENDA Introduction to SIP Functions of SIP Components of SIP SIP Protocol Operation Basic SIP Operation Introduction to SIP SIP (Session Initiation Protocol) is
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
SIP Trunking & Peering Operation Guide
SIP Trunking & Peering Operation Guide For Samsung OfficeServ May 07, 2008 doc v2.1.0 Sungwoo Lee Senior Engineer [email protected] OfficeServ Network Lab. Telecommunication Systems Division
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise
Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise This document describes configuration procedure for your Alcatel-Lucent OmniPCX Enterprise PBX in
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk) 1. Login to CID (Customer ID) Login https://manager.agile.ne.jp/login.php USERNAME Password 2. Go to SIP List of SIP TRUNK SIP SIP List Buy SIP Trunk
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
Three-Way Calling using the Conferencing-URI
Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document
ETSI TS 124 390 V11.0.0 (2012-10)
TS 124 390 V11.0.0 (2012-10) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Unstructured Supplementary Service Data (USSD) using IP Multimedia (IM) Core Network (CN) subsystem
Table of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC
Danar Barzanji Marcel K Steffen Roger Trösch 22.06.2006 Communication Systems IMS www.packetizer.com Table of Content Introduction Components Architectural Characteristics Concepts Protocols Service Examples
SIP - QUICK GUIDE SESSION INITIATION PROTOCOL - INTRODUCTION
SIP - QUICK GUIDE http://www.tutorialspoint.com/session_initiation_protocol/session_initiation_protocol_quick_guide.htm SESSION INITIATION PROTOCOL - INTRODUCTION Copyright tutorialspoint.com Session Initiation
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
SIP Introduction. Jan Janak
SIP Introduction Jan Janak SIP Introduction by Jan Janak Copyright 2003 FhG FOKUS A brief overview of SIP describing all important aspects of the Session Initiation Protocol. Table of Contents 1. SIP Introduction...
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
SIP and Mobility: IP Multimedia Subsystem in 3G Release 5
and Mobility: IP Multimedia Subsystem in 3G Release 5 Jörg Ott {sip,mailto}:[email protected] VDE / ITG Fachgruppe 5.2.4 Bremen 11 November 2002 2002JörgOtt TZI Digitale Medien und Netze 1 Overview IETF Conferencing
IP Office 4.2 SIP Trunking Configuration Guide AT&T Flexible Reach and AT&T Flexible Reach with Business in a Box (SM)
IP Office 4.2 SIP Trunking Configuration Guide AT&T Flexible Reach and AT&T Flexible Reach with Business in a Box (SM) Issue 1.0 (8 th October 2008) 2008 Avaya Inc. All Rights Reserved. Notice While reasonable
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
SIP Session Initiation Protocol Nicolas Montavont [email protected]
SIP Session Initiation Protocol Nicolas Montavont [email protected] SIP Session Initiation Protocol Henning Schulzrinne Department of Computer Science Columbia University, New York,
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
IxLoad: Advanced VoIP
IxLoad: Advanced VoIP IxLoad in a typical configuration simulating SIP endpoints Aptixia IxLoad VoIP is the perfect tool for functional, performance, and stability testing of SIPbased voice over IP (VoIP)
IP Office Technical Tip
IP Office Technical Tip Tip no: 200 Release Date: January 23, 2008 Region: GLOBAL IP Office Session Initiation Protocol (SIP) Configuration Primer There are many Internet Telephony Service Providers (ITSP)
Session Initiation Protocol (SIP) Chapter 5
Session Initiation Protocol (SIP) Chapter 5 Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part
Voice over IP Fundamentals
Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long
IMS Conference (IMS Conference Call) Calling UE IMS Network Called UE Caller User Equipment
IMS (IMS Call) MRFC-AS MRFP 18-May-08 10:40 (Page 1) This sequence diagram was generated with (http://www.eventhelix.com/eventstudio). Copyright 2008 EventHelix.com Inc. All Rights Reserved. The EventStudio
Session Initiation Protocol (SIP)
Il protocollo SIP Session Initiation Protocol (SIP) SIP is the IETF s standard for establishing VoIP connections It is an application layer control protocol for creating, modifying and terminating sessions
Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service
Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service Issue 2.2 06/25/2007 Page 1 of 41 Table of contents 1 Introduction...8
ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
SPAM over Internet Telephony and how to deal with it
SPAM over Internet Telephony and how to deal with it Diploma thesis - Rachid El Khayari Supervisor: Prof. Dr. Claudia Eckert, Dr. Andreas U. Schmidt, Nicolai Kuntze Fraunhofer Institute for Secure Information
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services Harry G. Perros Computer Science Department NC State University, Raleigh 27695 USA Email: [email protected]
SIP SOFTPHONE SDK Apple MAC Desktop OS
SIP SOFTPHONE SDK Apple MAC Desktop OS TECHNICAL DOCUMENTATION VERSION 1.4 November 2014 Page 1 of 69 CONTENTS INTRODUCTION AND QUICK START... 4 EXPORTED FUNCTIONS... 5 InitializeEx()... 5 RegisterToProxy()...
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks
Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)
Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138
Mobicents 2.0 The Open Source Communication Platform DERUELLE Jean JBoss, by Red Hat 138 AGENDA > VoIP Introduction > VoIP Basics > Mobicents 2.0 Overview SIP Servlets Server JAIN SLEE Server Media Server
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
SIP RFC (3261) explained, LIGHT 3.2 (1/2011) - www.sipknowledge.com
/*============================================================================*\ Note: The original contents of the RFC 3261 was left intact. We only added elaborative footnotes (and links in the ms-word
HRPD Support for Emergency Services
GPP X.S000-0 Version.0 Date: July 00 HRPD Support for Emergency Services COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
SIP Trunking Manual 05.15. Technical Support Web Site: http://ws1.necii.com (registration is required)
SIP Trunking Manual 05.15 Technical Support Web Site: http://ws1.necii.com (registration is required) This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers
FortiOS Handbook - VoIP Solutions: SIP VERSION 5.2.0
FortiOS Handbook - VoIP Solutions: SIP VERSION 5.2.0 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
Chapter 2 Voice over Internet Protocol
Chapter 2 Voice over Internet Protocol Abstract This chapter presents an overview of the architecture and protocols involved in implementing VoIP networks. After the overview, the chapter discusses the
Broadband Telephony. Terminal Equipment Requirements and Specifications
Broadband Telephony Terminal Equipment Requirements and Specifications TABLE OF CONTENTS 1 Introduction... 3 1.1 Scope... 3 1.2 Intended audience... 3 1.3 Notice... 3 1.4 Definitions... 3 2 BBT Service
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Push-to-talk Over Wireless
Push-to-talk Over Wireless Is the time right for Push-to-talk? Does it work over GPRS? www.northstream.se Conclusions Push-to-talk is a walkie-talkie-type service implemented over mobile networks. US operator
Technical Manual 3CX Phone System for Windows
Technical Manual 3CX Phone System for Windows This technical manual is intended for those who wish to troubleshoot issues encountered with implementing 3CX Phone System. It is not intended to replace the
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
10 Signaling Protocols for Multimedia Communication
Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
SIP Pocket Guide. Exclusive reference guide for Session Initiation Protocol professionals. The Future of Signaling
SIP Pocket Guide Exclusive reference guide for Session Initiation Protocol professionals The Future of Signaling Session Initiation Protocol (SIP) is a signaling protocol used for creating, modifying,
IxLoad Voice SIP Key Features
IxLoad Voice SIP Key Features IxLoad Voice SIP is the perfect tool for functional, performance, and stability testing of SIP-based voice over IP (VoIP) network components. Because IxLoad supports SIP,
Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs
Chapter V SIP Technology For Value Added Services (VAS) in NGNs http://users.encs.concordia.ca/~glitho/ Outline 1. SIP 2. SIP servlets 3. Examples of services that may be implemented with SIP technology
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0. Version 1
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0 Version 1 BroadWorks Guide Copyright Notice Trademarks Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation
Hacking Trust Relationships of SIP Gateways
Hacking Trust Relationships of SIP Gateways Author : Fatih Özavcı Homepage : gamasec.net/fozavci SIP Project Page : github.com/fozavci/gamasec-sipmodules Version : 0.9 Hacking Trust Relationship Between
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314
