What is included with this book?
Travis Russell is a senior manager in the Communications Software Solutions Group at Tekelec. He holds numerous patents and is the author of several books including Signaling System #7.
Foreword | p. ix |
Acknowledgments | p. xi |
Introduction | p. xiii |
Architecture of the IMS | p. 1 |
IMS Concepts | p. 1 |
The Intelligent Network and Signaling System #7 | p. 3 |
Entities in an IMS Core Network | p. 10 |
Call Session Control Function (CSCF) | p. 10 |
IMS Reference Points | p. 22 |
Moving from Legacy to Convergence | p. 27 |
Migrating the Backbone to an IP-Based Network | p. 28 |
Deploying VoIP as a Growth Strategy | p. 32 |
Deploying IMS | p. 33 |
Interworking Between the Legacy Network and IMS | p. 35 |
Migrating the OSS/BSS | p. 36 |
Interfacing to the IMS | p. 39 |
Circuit-Switched Domains (CS) | p. 40 |
Packet-Switched Domains (PS) | p. 48 |
VoIP Domain | p. 48 |
General Packet Radio Service (GPRS) | p. 51 |
UMTS and CDMA Domains | p. 52 |
From IMS to IMS | p. 54 |
Session Initiation Protocol (SIP) | p. 57 |
SIP Protocol Structure | p. 58 |
SIP Methods | p. 60 |
SIP Requests | p. 64 |
SIP Responses | p. 65 |
SIP Header Fields | p. 69 |
Session Description Protocol (SDP) | p. 83 |
Session Level Description | p. 84 |
Time Description | p. 84 |
Media Description | p. 84 |
Media Attribute Lines (a=) | p. 85 |
Addressing in the IMS | p. 87 |
Device Identity in the IMS | p. 89 |
SIP Identities in the IMS | p. 95 |
Domain Names and URIs | p. 96 |
User Identities | p. 99 |
Establishing a Session in the IMS | p. 105 |
Accessing the Network | p. 106 |
Locating the P-CSCF | p. 107 |
Registration in the IMS Using SIP | p. 109 |
Basic Session Registration | p. 112 |
Interworking with the PSTN | p. 118 |
Interworking with VoIP | p. 127 |
Establishing Sessions in the IMS Using SIP | p. 127 |
Basic Session Establishment | p. 128 |
Emergency Session Establishment | p. 134 |
Modifying SIP Sessions in the IMS | p. 135 |
Terminating SIP Sessions in the IMS | p. 136 |
Security Procedures in the IMS | p. 137 |
Security Threats in an IP Domain | p. 138 |
Eavesdropping | p. 139 |
Registration Hijacking | p. 139 |
Server Impersonation | p. 140 |
Message Body Tampering | p. 140 |
Session Teardown | p. 140 |
Denial-of-Service Attacks | p. 141 |
Amplification | p. 141 |
Securing the IMS | p. 142 |
Authentication & Authorization | p. 143 |
Confidentiality | p. 145 |
Denial of Service | p. 146 |
Integrity | p. 147 |
Privacy | p. 148 |
Non-Repudiation | p. 149 |
Access Security | p. 150 |
Encryption | p. 154 |
Authentication and Key Agreement | p. 155 |
Network Domain Security | p. 157 |
Online and Offline Charging in the IMS | p. 161 |
Introduction to Charging | p. 162 |
Charging Architecture | p. 162 |
User Profile | p. 171 |
Accounting with DIAMETER | p. 173 |
Charging in the IMS | p. 175 |
3GPP Documentation | p. 201 |
IMS-Related Documentation | p. 201 |
IETF IMS-Related Documentation | p. 206 |
Bibliography | p. 209 |
Index | p. 211 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.