did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071488532

The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations

by
  • ISBN13:

    9780071488532

  • ISBN10:

    0071488537

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-01-07
  • Publisher: McGraw-Hill Education
  • Purchase Benefits
List Price: $85.00 Save up to $8.50
  • Digital
    $76.50
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Build and maintain a converged multimedia network environmentSeamlessly merge the Internet with cellular and wireless networks using next-generation IMS technology and the comprehensive information contained in this authoritative resource. The IP Multimedia Subsystem: Session Control and Other Network Operations details the steps necessary to deliver Web-based content, VoIP, streaming multimedia, conference calls, and text messages across one integrated network. Learn how to transition to IMS architecture, communicate with legacy networks, control sessions using SIP, and connect subscribers to network services. In-depth coverage of the latest IMS security, business intelligence, customer care, and billing procedures is also included. Migrate legacy networks to IMS-based technology Use the Proxy, Interrogating, and Serving Call Session Control Functions Interface with TDM-based, wireless, wireline, and VoIP networks Handle private and public user identities, domain names, and URLs Establish SIP sessions and connect subscribers to network services Deploy reliable network, access, and user-level security Prevent eavesdropping, DoS, message tampering, and amplification exploits Track services rendered and charge subscribers using DIAMETER and CDRs

Author Biography

Travis Russell is a senior manager in the Communications Software Solutions Group at Tekelec. He holds numerous patents and is the author of several books including Signaling System #7.

Table of Contents

Forewordp. ix
Acknowledgmentsp. xi
Introductionp. xiii
Architecture of the IMSp. 1
IMS Conceptsp. 1
The Intelligent Network and Signaling System #7p. 3
Entities in an IMS Core Networkp. 10
Call Session Control Function (CSCF)p. 10
IMS Reference Pointsp. 22
Moving from Legacy to Convergencep. 27
Migrating the Backbone to an IP-Based Networkp. 28
Deploying VoIP as a Growth Strategyp. 32
Deploying IMSp. 33
Interworking Between the Legacy Network and IMSp. 35
Migrating the OSS/BSSp. 36
Interfacing to the IMSp. 39
Circuit-Switched Domains (CS)p. 40
Packet-Switched Domains (PS)p. 48
VoIP Domainp. 48
General Packet Radio Service (GPRS)p. 51
UMTS and CDMA Domainsp. 52
From IMS to IMSp. 54
Session Initiation Protocol (SIP)p. 57
SIP Protocol Structurep. 58
SIP Methodsp. 60
SIP Requestsp. 64
SIP Responsesp. 65
SIP Header Fieldsp. 69
Session Description Protocol (SDP)p. 83
Session Level Descriptionp. 84
Time Descriptionp. 84
Media Descriptionp. 84
Media Attribute Lines (a=)p. 85
Addressing in the IMSp. 87
Device Identity in the IMSp. 89
SIP Identities in the IMSp. 95
Domain Names and URIsp. 96
User Identitiesp. 99
Establishing a Session in the IMSp. 105
Accessing the Networkp. 106
Locating the P-CSCFp. 107
Registration in the IMS Using SIPp. 109
Basic Session Registrationp. 112
Interworking with the PSTNp. 118
Interworking with VoIPp. 127
Establishing Sessions in the IMS Using SIPp. 127
Basic Session Establishmentp. 128
Emergency Session Establishmentp. 134
Modifying SIP Sessions in the IMSp. 135
Terminating SIP Sessions in the IMSp. 136
Security Procedures in the IMSp. 137
Security Threats in an IP Domainp. 138
Eavesdroppingp. 139
Registration Hijackingp. 139
Server Impersonationp. 140
Message Body Tamperingp. 140
Session Teardownp. 140
Denial-of-Service Attacksp. 141
Amplificationp. 141
Securing the IMSp. 142
Authentication & Authorizationp. 143
Confidentialityp. 145
Denial of Servicep. 146
Integrityp. 147
Privacyp. 148
Non-Repudiationp. 149
Access Securityp. 150
Encryptionp. 154
Authentication and Key Agreementp. 155
Network Domain Securityp. 157
Online and Offline Charging in the IMSp. 161
Introduction to Chargingp. 162
Charging Architecturep. 162
User Profilep. 171
Accounting with DIAMETERp. 173
Charging in the IMSp. 175
3GPP Documentationp. 201
IMS-Related Documentationp. 201
IETF IMS-Related Documentationp. 206
Bibliographyp. 209
Indexp. 211
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program