562

IP Multimedia Subsystem (IMS) Handbook

Embed Size (px)

DESCRIPTION

Buku Pegangan Tentang Multimedia Subsystem

Citation preview

  • IP MultimediaSubsystem

    Handbook

    (IMS)

  • CRC Press is an imprint of theTaylor & Francis Group, an informa business

    Boca Raton London New York

    Edited by

    Syed A. AhsonMohammad Ilyas

    IP MultimediaSubsystem

    Handbook

    (IMS)

  • CRC PressTaylor & Francis Group6000 Broken Sound Parkway NW, Suite 300Boca Raton, FL 334872742

    2009 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business

    No claim to original U.S. Government worksPrinted in the United States of America on acidfree paper10 9 8 7 6 5 4 3 2 1

    International Standard Book Number13: 9781420064599 (Hardcover)

    This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

    Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

    For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 9787508400. CCC is a notforprofit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

    Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

    Library of Congress CataloginginPublication Data

    IP multimedia subsystem (IMS) handbook / editors, Syed A. Ahson, Mohammad Ilyas.

    p. cm.Includes bibliographical references and index.ISBN 9781420064599 (alk. paper)1. Internet Protocol multimedia subsystem. I. Ahson, Syed. II. Ilyas,

    Mohammad, 1936 III. Title.

    TK5105.15.I64 2008006.7dc22 2008032888

    Visit the Taylor & Francis Web site athttp://www.taylorandfrancis.comand the CRC Press Web site athttp://www.crcpress.com

  • Contents

    Preface...........................................................................................................ixThe.Editors....................................................................................................xiContributors............................................................................................... xiii

    Section 1 Concepts

    1 IMS Service, Models, and Concepts.................................................... 3Emmanuel Bertin and Nol Crespi

    2 IMSA Secure Architecture for All IP Networks.......................... 27Muhammad Sher and Thomas Magedanz

    3 Peer-to-Peer Features in the IP Multimedia Subsystem................. 73Adetola Oredope and Antonio Liotta

    4 On the Support of Media Functions within the IMS..................... 87Jean-Charles Grgoire and Admela Jukan

    Section 2 Technologies

    5 The FOKUS Open IMS CoreA Global IMS Reference Implementation................................................................................ 113Peter Weik, Dragos Vingarzan, and Thomas Magedanz

    6 Next-Generation Grid Support over the SIP/IMS Platform........ 133Vicente Olmedo, Antonio Cuevas, Victor Villagr, and Jos I. Moreno

    7 Policy-Based QoS Control for a Convergence Network............... 157Younghan Kim and.Youngsuk Lee

    8 OSA Service Capability ServerParlay/Parlay X......................... 169Moo Wan Kim and.Ryozo Ito

    9 Internetworking of 3GPP and WLAN and Wimax Networks..... 191Fangmin Xu, Luyong Zhang, Zheng Zhou, and Wei Zhong

  • i Contents

    10 IM-SSF Application ServerInterworking with CAMEL......... 215Moo Wan Kim and Ryozo Ito

    11 Distributed IMS............................................................................... 243Marcin Matuszewski

    Section 3 Services

    12 Service Delivery Platforms and Multimedia Service Design... 265Christopher J. Pavlovski

    13 The Integration of IMS into Service Delivery Platforms Based on Service-Oriented Architectures.................................... 307Niklas Blum, Peter Weik, and Thomas Magedanz

    14 Service Orchestration in IMS......................................................... 329Anahita Gouya and Nol Crespi

    15 Instant Messaging and Presence Service (IMPS)........................ 345Whai-En Chen

    16 Multiparty Services in the IP Multimedia Subsystem............... 363Ivn Vidal, Ignacio Soto, Francisco Valera, Jaime Garca, and Arturo Azcorra

    17 IMS-Based Conferencing Services: An Engineering Approach........................................................................................... 383Alessandro Amirante, Tobia Castaldi, Lorenzo Miniero, and Simon Pietro Romano

    18 IMS-Based IPTV.............................................................................. 411Oliver Friedrich, Stefan Arbanowski, Adel Al-Hezmi, and Robert Seeliger

    19 IPTV Modeling and Architecture over IMS................................ 443David Lpez, Eugen Mikoczy, Jos Ignacio Moreno, Antonio Cuevas, and Enrique Vzquez

    20 SIP-Based Prepaid Application Server......................................... 473Mario Weber

    21 JAIN SLEE Platforms for IMS Application Servers.................... 493Igor Vukomanovi

  • Contents ii

    22 Role of OSS/BSS in the Success of IMS....................................... 509Jithesh Sathyan

    Index........................................................................................................... 531

  • ix

    Preface

    Fixed-mobile.convergence.and.voice-data.networks.have.merged.next-gen-eration,.value-added.applications.and.integrated.multimedia.services,.com-bining. Web. browsing,. instant. messaging,. presence,. voice. over. IP,. video.conferencing,. application. sharing,. telephony,. unified. messaging,. multi-media. content. delivery,. etc..on. top.of.different. network. technologies.. The.convergence.of. the.communications.networks. is.motivated.by. the.need.to.support.many.forms.of.digital.traffic.as.well.as.to.amortize.implementation.and.operational.costs.of.the.underlying.networks..Historically,.the.approach.to. build. and. deploy. multimedia. services. has. focused. upon. single-point.solutions..These.solutions.worked.well.to.address.the.specific.needs.of.the.intended.service.or.related.set.of.services;.however,.they.possess.shortcom-ings.in.extensibility.to.cater.to.the.newer.and.emerging.multimedia.services..A.more.pragmatic.approach.is.to.develop.a.single.consolidated.platform.that.is.capable.of.supporting.a.wide.variety.of.multimedia.services.over.several.communication.networks.

    The.IP.multimedia.subsystem.(IMS).is.a.standardized.next-generation.net-working.architecture.that.has.been.conceived.for.telecom.operators.willing.to.provide.advanced.services.on.top.of.both.mobile.and.fixed.networks..The.IMS.is.a.service-oriented.architectural.framework.that.aims.to.provide.exist-ing.and.future.Internet.services.to.both.fixed.and.mobile.end.users.over.a.multi-access,.all-IP.platform..The.3rd.Generation.Partnership.Project.(3GPP).and.3GPP2.have.developed.the.IMS.to.provide.service.delivery.platforms.for.a.converged.communication.paradigm..The.IMS.provides.ways.for.integrat-ing.existing.Internet.services.with.future.ones..It.is.a.well-designed.service.platform,.using.open.and.standardized.Internet.protocols.and.respecting.the.Internet.paradigm.of.data. transport.and.application.separation.with. links.between.these.two.layers..The.IMS.offers.telecom.operators.the.possibility.to.build.an.open.IP-based.service.infrastructure.that.will.enable.easy.deploy-ment.of.new,.rich.multimedia.communication.services.mixing.telecom.and.data.services.

    The.IP.multimedia.subsystem.grants.the.network.operator.the.role.of.ser-vice.broker..Multimedia.calls.are.a. service. inherent. to. the. IMS,.but.many.more. services. are. being. developed. on. top. of. the. IMS. service. platform. to.build.a.rich.service.environment.enticing.the.users.to.employ.it..The.IMS.is.an.IP-based.architecture.designed.to.provide.a.set.of.essential.functionalities.that.support.the.delivery.of.the.next-generation.multimedia.services.that.are.envisioned.in.the.future.of.third-generation.networks.

    The.IMS.architecture.has.been.defined.to.provide.the.user.with.access.to.a. wide. range. of. services,. which. are. implemented. by. means. of. application.servers..The. IMS.has. resulted. in.an.environment. that. introduces.new.ser-vices.more.quickly.than.ever.before.as.well.as.exciting.new.concepts.such.as.

  • x Preface

    reusable.service.components.and.real-time.integration..The.IMS.fills.the.gap.between.the.existing.traditional.telecommunications.technology.and.Inter-net.technology,.allowing.operators.to.offer.new,.innovative,.and.compelling.services;.it.represents.a.standardized,.reusable.platform.that.provides.a.better.way.to.roll.in,.roll.out,.deploy,.integrate,.and.expand.consumer.and.enterprise.voice.and.data.services..There.is.increased.interest.in.the.IMS.due.to.its.ability.to.revolutionize.the.end-user.experience.with.new.and.innovative.services.

    The.IP Multimedia Subsystem (IMS) Handbook.provides.technical.informa-tion.about.all.aspects.of.the.IMS..The.areas.covered.in.the.handbook.range.from.basic.concepts.to.research-grade.material,.including.future.directions..The.handbook.captures.the.current.state.of.IMS.technology.and.serves.as.a.source.of.comprehensive.reference.material.on.this.subject..There.are.three.sections. in. the.handbook:.Concepts,.Technologies,. and.Services.. It.has.a.total.of.22.chapters.authored.by.50.experts.from.around.the.world..The.tar-geted.audience.for.the.handbook.includes.professionals.who.are.designers.or.planners.for.IMS.systems,.researchers.(faculty.members.and.graduate.stu-dents),.and.those.who.would.like.to.learn.about.this.field.

    This.handbook.has.the.following.specific.salient.features:

    to.serve.as.a.single.comprehensive.source.of.information.and.as.ref-erence.material.on.IMS.technology;to.deal.with.an.important.and.timely.topic.of.emerging.technology.of.today,.tomorrow,.and.beyond;to.present.accurate,.up-to-date.information.on.a.broad.range.of.top-ics.related.to.IMS.technology;to.present.material.authored.by.the.experts.in.the.field;.andto. present. the. information. in. an. organized. and. well-structured.manner.

    Although.the.handbook.is.not.precisely.a.textbook,.it.can.certainly.be.used.as.a.textbook.for.graduate.courses.and.research-oriented.courses.that.deal.with.the.IMS..Any.comments.from.readers.will.be.highly.appreciated.

    Many.people.have.contributed.to.this.handbook.in.their.unique.ways..The.first.and.the.foremost.group.that.deserves.immense.gratitude.is.the.group.of.highly.talented.and.skilled.researchers.who.have.contributed.22.chapters.to.this.handbook..All.of.them.have.been.extremely.cooperative.and.profes-sional..It.has.also.been.a.pleasure.to.work.with.Nora.Konopka,.Jessica.Vakili,.and.Judith.Simon.of.CRC.Press.and.we.are.extremely.grateful.for.their.sup-port.and.professionalism..Our. families.have.extended. their.unconditional.love.and.strong.support.throughout.this.project.and.they.all.deserve.very.special.thanks.

    Syed AhsonPlantation, Florida

    Mohammad IlyasBoca Raton, Florida

  • xi

    The Editors

    Syed Ahson.is.a.senior.staff.software.engineer.with.Motorola,.Inc..He.has.played.a.leading.role.in.and.contributed.significantly.to.the.creation.of.several.advanced.and.exciting.cellular.phones.at.Motorola..He.has.extensive.expe-rience.with.wireless.data.protocols. (TCP/IP,.UDP,.HTTP,.VoIP,.SIP,.H.323),.wireless.data.applications.(Internet.browsing,.multimedia.messaging,.wire-less. e-mail,. firmware. over-the-air. update),. and. cellular. telephony. proto-cols. (GSM,.CDMA,.3G,.UMTS,.HSDPA)..Prior. to. joining.Motorola,.he.was.a.senior.software.design.engineer.with.NetSpeak.Corporation.(now.part.of.Net2Phone),.a.pioneer.in.voice.over.IP.telephony.software.

    Ahson.is.a.co-editor.of.the.three-volume.WiMAX Handbook.(CRC.Press).and.has.authored.Smartphones,.a. research. report. that. reflects.on. the.smart-phone.market.and. technologies. for. the. International.Engineering.Consor-tium.(IEC)..He.has.published.several.research.articles.and.teaches.computer.engineering.courses.as.adjunct.faculty.at.Florida.Atlantic.University.in.Boca.Raton,.Florida,.where.he.introduced.a.course.on.smartphone.technology.and.applications..He.received.his.MS.degree.in.computer.engineering.in.1998.at.Florida.Atlantic.University.and.his.BSc.degree.in.electrical.engineering.from.Aligarh.University,.India,.in.1995.

    Mohammad Ilyas.received.his.BSc.degree.in.electrical.engineering.from.the.University.of.Engineering.and.Technology,.Lahore,.Pakistan,.in.1976..From.March.1977.to.September.1978,.he.worked.for.the.Water.and.Power.Develop-ment.Authority.in.Pakistan..In.1978,.he.was.awarded.a.scholarship.for.his.graduate.studies.and.completed.his.MS.degree.in.electrical.and.electronic.engineering.in.June.1980.at.Shiraz.University,.Shiraz,.Iran..In.September.1980,.he.joined.the.doctoral.program.at.Queens.University.in.Kingston,.Ontario,.Canada..He.completed.his.PhD.degree. in.1983..His.doctoral.research.was.about. switching. and. flow. control. techniques. in. computer. communication.networks..Since.September.1983,.he.has.been.with.the.College.of.Engineer-ing.and.Computer.Science.at.Florida.Atlantic.University,.Boca.Raton,.Flor-ida,.where.he.is.currently.associate.dean.for.research.and.industry.relations..From.1994.to.2000,.he.was.chair.of.the.Department.of.Computer.Science.and.Engineering..From.July.2004.to.September.2005,.he.served.as.interim.associ-ate.vice.president.for.research.and.graduate.studies..During.the.19931994.academic.year,.he.was.on.sabbatical.leave.with.the.Department.of.Computer.Engineering,.King.Saud.University,.Riyadh,.Saudi.Arabia.

    Dr.. Ilyas. has. conducted. successful. research. in. various. areas,. including.traffic.management.and.congestion.control.in.broadband/high-speed.com-munication.networks,.traffic.characterization,.wireless.communication.net-works,.performance.modeling,.and.simulation..He.has.published.one.book,.eight.handbooks,.and.more.than.150.research.articles..He.has.supervised.11.

  • xii TheEditors

    PhD.dissertations.and.more.than.37.MS.theses.to.completion..He.has.been.a.consultant.to.several.national.and.international.organizations..Dr..Ilyas.is.an.active.participant.in.several.IEEE.technical.committees.and.activities,.a.senior.member.of.IEEE,.and.a.member.of.ASEE.

  • xiii

    Contributors

    Adel Al-Hezmi Fraunhofer.FOKUS.Research. Institute. for.Open.Com-munication.Systems,.Berlin,.Germany

    Alessandro Amirante Universit.di.Napoli.Federico.II,.Napoli,.Italy

    Stefan Arbanowski Fraunhofer.FOKUS.Research.Institute.for.Open.Com-munication.Systems,.Berlin,.Germany

    Arturo Azcorra IMDEA.Networks,.Madrid,.Spain.Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Emmanuel Bertin Orange.Labs,.France.Telecom,.Caen,.France

    Niklas Blum Fraunhofer.FOKUS.Research.Institute.for.Open.Commu-nication.Systems,.Berlin,.Germany

    Tobia Castaldi Universit.di.Napoli.Federico.II, Napoli,.Italy

    Whai-En Chen National.I-Lan.University, Taiwan,.Republic.of.China

    Nol Crespi GET-INTInstitut.National.des.Tlcommunications, Evry,..France

    Antonio Cuevas Universitt.Stuttgart, Stuttgart,.Germany

    Oliver Friedrich Fraunhofer.FOKUS.Research.Institute.for.Open.Com-munication.Systems,.Berlin,.Germany

    Jaime Garca Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Anahita Gouya Institut.National.des.Tlcommunications,.Evry,.France

    Jean-Charles Grgoire EMT-INRS.University.of.Quebec,.Quebec,.Canada

    Ryozo Ito Hewlett-Packard,.Tokyo,.Japan

    Admela Jukan EMT-INRS.University.of.Quebec,.Quebec,.Canada

    Moo Wan Kim Tokyo.University.of.Information.Sciences,.Tokyo,.Japan

  • xi Contributors

    Younghan Kim Soongsil.University,.Seoul,.South.Korea

    Youngsuk Lee Soongsil.University,.Seoul,.South.Korea

    Antonio Liotta University.of.Essex,.Colchester,.United.Kingdom

    David Lpez Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Thomas Magedanz Fraunhofer.Institute.FOKUS,.Berlin,.Germany

    Marcin Matuszewski Nokia,.Espoo,.Finland

    Eugen Mikoczy Slovak.University.of.Technology,.Bratislava,.Slovakia

    Lorenzo Miniero Universit.di.Napoli.Federico.II,.Napoli,.Italy

    Jos Ignacio Moreno Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Vicente Olmedo Universidad.Politcnica.de.Madrid,.Madrid,.Spain

    Adetola Oredope University.of.Essex,.Colchester,.United.Kingdom

    Christopher J. Pavlovski IBM,.St..Leonards,.New.South.Wales,.Australia

    Simon Pietro Romano Universit.di.Napoli.Federico.II,.Napoli,.Italy

    Jithesh Sathyan Infosys.Technologies.Limited,.Bangalore,.India

    Robert Seeliger Fraunhofer.FOKUS.Research.Institute.for.Open.Commu-nication.Systems,.Berlin,.Germany

    Muhammad Sher Technical.University.of.Berlin,.Berlin,.Germany

    Ignacio Soto Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Francisco Valera Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Enrique Vzquez Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Ivn Vidal Universidad.Carlos.III.de.Madrid,.Madrid,.Spain

    Victor Villagr Universidad.Politcnica.de.Madrid,.Madrid,.Spain

    Dragos Vingarzan Fraunhofer.FOKUS.Research.Institute.for.Open.Com-munication.Systems,.Berlin,.Germany

  • Contributors x

    Igor Vukomanovi KATE-KOM,.Zagreb,.Croatia

    Mario Weber KATE-KOM,.Zagreb,.Croatia

    Peter Weik Technical.University.of.Berlin,.Berlin,.Germany

    Fangmin Xu Beijing.University.of.Posts.and.Telecommunications,.Beijing,.Republic.of.China

    Luyong Zhang Beijing.University.of.Posts.and.Telecommunications,.Beijing,.Republic.of.China

    Wei Zhong Duke.University,.Chapel.Hill,.North.Carolina

    Zheng Zhou Beijing.University.of.Posts.and.Telecommunications,.Beijing,.Republic.of.China

  • Section 1

    Concepts

  • 1IMSService,Models,andConcepts

    Emmanuel Bertin and Nol Crespi

    CONTENTS

    Introduction..............................................................................................................3The.Foundations.of.IMS.Services..........................................................................4

    From.IN.to.NGN.............................................................................................4From.NGN.to.IMS...........................................................................................7IMS.Service.Capabilities.and.OMA.Enablers.............................................9

    IMS.Service.Model................................................................................................. 12IMS.Brings.New.Types.of.Services............................................................ 12The.Link.between.Services.Seen.by.the.User........................................... 13Technical.Functions...................................................................................... 14Relationship.between.Service.and.Technical.Function.......................... 16

    Example.of.the.Push-to-Talk.over.Cellular........................................................ 17PoC.Service.Seen.from.the.Users.Perspective......................................... 18PoC.Service.and.Service.Enablers.............................................................. 19Technical.Functions.for.PoC.Service.......................................................... 19A.Comprehensive.View.of.IMS.Services...................................................22

    Conclusion...............................................................................................................22Glossary................................................................................................................... 24References............................................................................................................... 24

    Introduction

    NGN.(next-generation.network).is.a.concept.that.has.been.introduced.to.take.into.account.the.new.situation.and.changes.in.the.telecommunications.fields..This.new.situation.is.characterized.by.a.number.of.aspects:.the.deregulation.of.markets,.the.new.demand.from.users.for.innovative.services.to.meet.their.needs,.and.the.explosion.of.digital. traffic. (increase.of. Internet.usage)..The.introduction.of.NGN.comprises.economic.and.technical.aspects..Economi-cally,. it.allows.increasing.productivity.by.creating.new.usage.[1].based.on.user.preferences.and.related. to.voice.and.data.services. (e.g.,.voice.over. IP,.

  • IPMultimediaSubsystem(IMS)Handbook

    instant. messaging,. presence,. streaming,. and. push. to. talk).. It. also. permits.reducing.costs.for.infrastructure.maintenance,.with.only.one.type.of.trans-port.network.instead.of.specific.ones.for.each.access.network..Technically,.NGN.makes.the.network.architecture.flexible.in.order.to.define.and.intro-duce.new.services.easily.

    The.cornerstone.of.the.service.architecture.for.next-generation.networks.is. the. IMS.(IP.multimedia.subsystem).architecture,.standardized.by.3GPP.(3rd.Generation.Partnership.Project)..The.IMS.offers.telecom.operators.the.possibility.to.build.an.open.IP-based.service.infrastructure.that.will.enable.easy.deployment.of.new,.rich.multimedia.communication.services.mixing.telecom.and.data.services.

    The. conception. of. IMS. services. is. a. key. challenge. for. the. telecom. mar-ket..IMS.services.are.fundamentally.tailored.to.user.preferences,.rely.seam-lessly.on.multiple.access.networks,.and.bundle.multiple.service.features.(e.g.,.voice/video.connectivity,.community.tools,.presence,.conferencing,.gaming,.and.TV.broadcasting).

    The. architecture. and. technical. aspects. of. the. IMS. architecture. are. well.addressed. by. the. standardization. bodies.. However,. a. clear. model. of. what.an. IMS.service. is. (and.what. it. is.not). is.not.proposed.by. these.bodies..The.objective. of. this. chapter. is. to. detail. the. concepts. behind. IMS. services. and.to.propose.a.way.to.link.IMS.service,.service.building.blocks,.and.technical.functions.

    This.chapter.is.divided.into.three.sections..In.the.first.section,.we.present.a.survey.of.IMS.services,.starting.by.briefly.introducing.NGN.architecture.and.then.describing.IMS.service.architecture.and.the.OMA.(Open.Mobile.Alliance).achievements..In.the.second.section,.we.present.how.IMS.services.can.be.linked.with.service.building.blocks.and.with.technical.functions..In.the.third.section,.we.illustrate.the.previous.section.with.the.case.study.of.the.push-to-talk.over.cellular.service.(PoC),.specified.by.the.OMA.

    The Foundations of IMS Services

    From IN to NGN

    The.concept.of.intelligent.networks.(INs).developed.in.the.1980s.was.a.pre-cursor.of.the.NGN..The.principle.of.INs.is.to.separate.clearly.the.switching.functions.from.the.service.data.and.logic.located.in.an.external.entity:.the.service. control.point. (SCP)..A.new. functional. entity. is.added. to. the.TDM.(Time.Division.Mutiplexing).switch,.the.service.switching.point.(SSP),.which.interfaces.between.the.service.logic.and.the.switch.itself..An.interface.based.on.the.intelligent.network.application.part.(INAP).protocol.family.is.intro-duced.between.the.SSP.and.the.SCP..The.services.are.no.longer.developed.in.the.TDM.switchas.with.the.concept.of.global.system.for.mobile.com-

  • IMSService,Models,andConcepts

    munications.(GSM).and.integrated.services.digital.network.(ISDN).supple-mentary. servicesbut. rather.are. implemented. in. the.SCP..The. INAP.and.associated.procedures.allow.the.SCP.to.control.and.monitor.the.switch.

    The.intelligent.network.introduced.the.concept.of.a.service.independent.building. block. (SIB). for. reusable. service. functions.. A. service. could. thus.be.thought.of.as.a.composition.of.various.SIBs..But.this.goal.was.not.fully.achieved.because.of.a. lack.of. independence.with.INAP.protocol,.a. lack.of.software.reusability,.and.a.lack.of.openness.by.manufacturers.and.operators..As.a.consequence,.INs.deployed.today.rely.on.a.monolithic.architecture.and.service. platforms. do. not. offer. flexible. services.. In. addition,. as. the. service.logic.is.executed.in.external.entities,.triggering.multiple.services.for.one.call.requires. having. service. interaction. management. mechanisms.. This. issue,.known.as.feature.interaction,.is.one.of.the.most.complex.problems.encoun-tered.in.IN.and.considerable.work.has.been.done.on.it..However,.this.work.cannot.be.directly.applied.to.the.NGN.because.of.the.service.and.architec-tural.differences.between.IN.and.NGN.

    The.promise.of.the.NGN,.as.defined.in.the.late.1990s,.was.to.offset.these.shortcomings. by. moving. from. a. vertical. approach. (where. access,. control,.and. services. are. closely. tied). to. a. horizontal. approach. (where. each. layer.provides.reusable.elements.to.other.layers)..Specification.work.is.ongoing.at.the.International.Telecommunication.Union.(ITU)-T.(as.described.in.Knight-son,.Morita,.and.Towle. [2]). to. formalize. the.separation. (e.g.,. through.stan-dard.protocols.or.application.programming.interfaces.[APIs]).between

    the. transport.stratum.that. is.composed.of. transfer. functions. from.various. access. networks. (UMTS. terrestrial. radio. access. network.[UTRAN],.wireless.local.area.network.[WLAN],.xDSL).and.from.the.core. networks,. control. functions. for. these. transfer. functions. (e.g.,.network. attachment. control. or. resource. and. admission. control),.the.transport.user.profiles.(e.g.,.to.store.the.data.linked.to.network.attachment),. and. the. media. handling. functions. (e.g.,. for. playing.announcements.or.for.transcoding);.andthe.service.stratum.composed.of.access-independent.service.control.functions. (e.g.,. session. establishment. control. or. service. triggering.control),.application.functions,.and.service.user.profiles..Application.functions.should.be.independent.from.the.service.control.functions.and. should. offer. flexibility. (e.g.,. by. using. open. software. mecha-nisms).to.answer.user.needs.

    This.NGN.architecture.with.two.strata.is.defined.at.the.International.Tele-communication. Union. Telecommunication. Standardization. Sector. (ITU-T).(Figure.1.1)..The.NGN.architecture.may.also.be.represented.with.three.layers.instead.of.two.strata.(this.is,.for.instance,.the.case.at.the.European.Telecom-munications.Standards. Institute. [ETSI]).. In. this. case,. service. control. func-tions.and.transport.control.functions.are.grouped.into.a.control.layer..The.

  • IPMultimediaSubsystem(IMS)Handbook

    separation.thus.involves.a.transfer.layer.(with.transfer.functions),.a.control.layer.(with.transport.control.functions.and.service.control.functions),.and.an.application.layer.(with.application.functions).

    We.can.draw.a.parallel.between.IN.and.NGN.architectures:.The.service.control. function. (usually. implemented. with. a. session. initiation. protocol.[SIP].proxy).is.the.NGN.counterpart.of.the.TDM.switch/SSF.(service.selec-tion.function).and.the.application.function.(for.example,.implemented.with.a.SIP.application.server).is.the.NGN.counterpart.of.the.service.control.func-tion.(SCF)..In.both.architectures,.the.triggering.criteria.have.been.defined.in.order.not. to. invoke.services.systematically.but.only.when.required..How-ever,. there. is. a. key. difference. between. those. architectures. regarding. the.triggering.mechanisms..In.IN,.the.SCF.controls.the.SSF.using.INAP,.which.is. independent.of.the.call.control.protocols.. In.the.NGN.architectures,. the.application.function.is.inserted.in.the.signaling.path;.therefore,.all.SIP.sig-naling.requests.and.responses.can.be.intercepted.by.the.entity.controlling.the.services..Indeed,.the.IN.concept.of.point.of.control.(i.e.,.an.entity.that.can.control.the.SSP.and.modify.the.signaling.at.any.time).does.not.exist.in.the.NGN.context..This.concept.is.replaced.by.the.notion.of.application.func-tion.present.in.the.signaling.path,.which.can.modify.SIP.messages.to.execute.a.service.logic..The.consequence.of.this.fundamental.difference.in.signaling.and.architecture.is.that.mechanisms.defined.in.IN.for.feature.interaction.are.mostly.not.applicable.for.SIP.

    ServiceUser Profiles

    Service Stratum ApplicationFunctions

    Service ControlFunctions

    Transport ControlFunctions

    TransferFunctions

    Control flows Media flows

    Media HandlingFunctions

    TransportUser Profiles

    Transport Stratum

    End-UserFunctions

    FIGure 1.1NGN.technical.architecture.[2].

  • IMSService,Models,andConcepts

    From NGN to IMS

    The.IMS.architecture.is.a.realization.of.NGN.principles,.relying.on.the.SIP.protocol.for.the.session.control..The.IMS.specifications.[3].define.the.whole.multimedia.session.control.architecture.on.top.of.the.universal.mode.telecom-munications.system.(UMTS).packet-switched.domain..With.IMS,.operators.provide.both.reliable.session.control.and.better.integrated.services..Because.IMS.is.solving.architectural.issues.for.SIP.deployments.(as.detailed.in.Bertin,.Bury,.and.Lesieur.[4]),.it.is.now.seen.as.a.guideline.for.all.SIP.deployment.using.the.client/server.paradigm..While.the.IETF.(Internet.Engineering.Task.Force).has.standardized.the.SIP.protocol.but.not.the.associated.architectures.[5],. the. 3GPP. has. defined. with. precision. the. architectures. and. the. proce-dures.to.ensure.roaming,.scalability,.security,.and.reliability..Moreover,.the.IMS.specifications.are.not. intrinsically. linked.to.mobile.networks. [6].. IMS.was,. for. the. most. part,. conceived. independently. from. the. UMTS. packet-switched. domain. and. can. be. adapted. to. other. types. of. access. networks..3GPP.has.specified.the.interface.between.IMS.and.WLAN.access.networks.(IMS.release.6).[7]..The.ETSI.TISPAN.(Telecommunications.and.Internet.Con-verged.Services.and.Protocols.for.Advanced.Networking).project.specifies.the.adaptations.controlling.xDSL.access.networks.with.IMS.[8]..In.addition.to.IMS,.TISPAN.is.also.defining.other.subsystems.such.as.public.switched.telephone. network. (PSTN)/ISDN. emulation. for. PSTN. replacement. (which.will.be.needed.in.Europe.between.2008.and.2012).

    The.major.elements.related.to.service.architecture.are.the.following:

    S-CSCFs. (serving. call. state. control. functions). implement. service.control.functions.(session.control.and.service.triggering).HSS. (home. subscriber. server). is. the. central. service. and. network.database..It.implements.the.service.user.profiles.(as.well.as.the.trans-port.user.profiles).ASs.(application.servers).implement.the.application.functions,.pro-viding. session-related. services. to. users.. The. ASs. offer. APIs. like.OSA/Parlay.or.SIP.servlet.for.application.execution.

    Concerning.user.identity,.the.user.is.represented.in.IMS.by.several.identi-fiers..Public.identities.are.routable.addresses.that.can.be.communicated.to.the.contacts.of.the.user.and.can.be.used.to.reach.this.user.(e.g.,.sip:[email protected]:+33123456789)..Private.identities.belong.to.the.IMS.operator.and.are.stored.in.the.SIM.(subscriber.identity.module).card..The.same.user.may.have.several.private.user. identities.and.several.public.user. identities,.but.only.one.private.identity.is.stored.per.SIM.card.(Figure.1.2).

    Concerning. service. triggering,. IMS. provides. an. application. triggering.architecture.based.on.filter.criteria.and.service.points.triggers.(SPTs).[9]..Ini-tial.filtering.criteria.(iFC).allow.the.S-CSCF.to.decide.which.services.should.be. invoked. during. a. SIP. session. or. transaction. and. in. which. order. they.should.apply..The.SPTs.are. the.points. in. the.SIP.signaling.on.which.filter.

  • IPMultimediaSubsystem(IMS)Handbook

    criteria.can.be.set..The.filter.criteria.are.distributed.among.the.S-CSCF,.HSS,.and.IMS.application.server,.as.shown.in.the.Figure.1.3.

    iFCs.are.stored.in.the.HSS.as.a.part.of.the.service.profile..They.are.down-loaded.to.the.S-CSCF.upon.user.registration.or.upon.a.terminating.initial.request.for.an.unregistered.user..They.are.active.during.the.registration.life-time.or.until.the.service.profile.is.changed..Filter.criteria.should.contain.the.following.information,.structured.in.an.XML.format:

    the.address.of.the.AS.to.be.contacted;the.priority.of.the.filter.criteria.providing.the.sequence.in.which.the.criteria.will.be.applied;

    IMSSubscription

    PrivateUser Identity

    PublicUser Identity

    PublicUser Identity

    PublicUser Identity

    ServiceProfile

    ServiceProfile

    FIGure 1.2IMS.user.identities.in.IMS.release.5.[3].

    SIP SIP

    SIP

    Filter CriteriaSPT

    HSS

    iFC

    S-CSCF

    Application Server

    Service Logic

    Service Platform Trigger Points

    SIP Interface

    FIGure 1.3Application.server.triggering.architecture.[9].

  • IMSService,Models,andConcepts

    the.SPTs,.which.may.contain.the.following.information:.SIP.method,.presence. or. absence. of. any. header,. content. of. any. header,. session.description.information,.etc.;default.handling.if.the.AS.is.not.reachable;.andoptional.service.information,.added.to.the.message.body.before.it.is.sent.to.the.AS.

    During.the.registration.phase,.an.S-CSCF.is.assigned.to.control.user.ser-vices..The.service.profile.(containing.iFCs).of.the.user.is.downloaded.from.the.HSS.to.the.S-CSCF..When.the.S-CSCF.receives.a.SIP.request.matching.the.iFC,.it.invokes.the.associated.service.by.forwarding.this.SIP.request.to.the.AS.indicated.in.the.iFC..iFCs.are.only.applied.to.initial.SIP.requests.(i.e.,.the. requests. initiating. a. SIP. session. or. transaction:. INVITE,. SUBSCRIBE,.REGISTER,.OPTION,.etc.);.consequently,.the.service.invocation.can.be.done.only.statically.in.the.SIP.session.or.transaction.initiation.phase.

    A. user. may. subscribe. to. several. services,. and. as. a. consequence. several.iFCs. may. be. present. in. the. service. profile.. When. the. S-CSCF. receives. an.initial.SIP.request,.it.checks.whether.it.matches.the.iFC.that.has.the.highest.priority.for.this.user..If.it.does.not.match,.the.S-CSCF.checks.the.next.iFC,.in.the.predefined.priority.order..If.it.matches,.the.S-CSCF.forwards.the.request.to.the.indicated.AS..This.AS.executes.the.service.logic,.eventually.modifies.the.request,.and.sends.it.back.to.the.S-CSCF..The.S-CSCF.performs.the.same.processing.with.the.next.unexecuted.iFC..The.S-CSCF.continues.this.process.until.all. the. iFCs.are.checked..The.AS.may.also.suppress. the. information.required.to.trigger.the.iFC.(e.g.,.replacement.of.public.identity.by.a.globally.routable.user.agent.[UA].uniform.resource.identifier.[URI]).or.locally.end.the.request.as.a.part.of.the.service.logic.(e.g.,.a.prepaid.account.without.remain-ing.credit)..These.mechanisms.will.be.used.to.build.future.communication.services.with.the.IMS.

    3GPP.had.specified.a.SIP.AS.called.service.capability.interaction.manager.(SCIM).for.managing.the.interactions.between.application.servers,.but.nei-ther.the.service.invocation.functionalities.over.ISC.nor.the.service.interac-tion.management.functionalities.of.SCIM.are.specified.in.the.standards.[14]..These.points.are.detailed.in.Chapter.14,.Service.Orchestration.in.IMS.

    IMS Service Capabilities and OMA enablers

    The.business.purpose.of.the.IMS.is.to.enable.the.building.of.innovative.ser-vices.in.a.flexible.way..IMS.services.will.include.multiple.service.features.like.chat,.instant.messaging,.voice,.video,.presence,.address.book,.and.TV.broad-casting.[10,11]..If.all.these.features.are.deployed.in.an.uncoordinated.way.by.a.service.provider,.the.user.will.have.to.handle.the.interaction.between.the.services. (e.g.,.by.entering. the.same.personal.preferences. several. times).. In.addition,.advanced.services.that.combine.many.service.features.(like.routing.voice.calls.according.to.the.originating.community.and.the.availability.state).

  • 10 IPMultimediaSubsystem(IMS)Handbook

    are.not.possible.if.there.is.no.coordination.between.features..The.answer.to.improving. user. experience. is. to. build. a. coherent. service. environment. by.standardizing.the.applications.functions.

    Standardization.of.application.functions.is.today.mainly.driven.by.ITU-T,.3GPP,.and.OMA..Telecom.and.IT.companies.regroup.within.OMA.to.specify.interoperable.advanced.mobility.services..OMA.was.created.in.June.2002.as.a.combination.of.the.WAP.forum,.the.SyncML.Initiative,.the.MMS.Interoper-ability.Group,. the.Wireless.Village. Initiative,. the.Mobile.Wireless. Internet.Forum,.and. the.Mobile.Games. Interoperability.Forum..The.goal.of. ITU-T,.3GPP,.and.OMA.is.not.to.standardize.complete.services.but,.rather,.to.stan-dardize.functional.service.building.blocks.that.are.reusable.at.runtime.by.various.services,.as.defined.in.Bertin,.Bury,.and.Lesieur.[13]..This.approach.enables. the. building. of. innovative. and. evolving. services. mostly. indepen-dently.of.network.considerations..These.service.building.blocks.provide.key.capabilities.to.ensure.interoperability.of.devices,.operators,.and.service.pro-viders..As.seen.before,.ITU-T.and.3GPP.are.standardizing.the.mechanisms.that.trigger.these.building.blocks,.either.separately.or.in.a.coordinated.way,.including. the. management. of. interactions. between. these. capabilities,. as.shown.in.Gouya,.Crespi,.and.Bertin.[14]..These.service.building.blocks.are.called.service.capabilities.at.3GPP,.service.support.capabilities.at.ITU-T,.and.service.enablers.at.OMA..Service.support.capabilities.studied.at.ITU-T.[15].typically.include.presence,.location,.group.management,.message.handling,.broadcast/multicast,.push.and.session.handling,.or.device.management..Ser-vice.enablers.at.OMA.[16].include,.for.example,.data.synchronization,.device.management,.digital.rights.management,.downloading,.e-mail.notification,.instant.messaging,.presence.and.mobile.location,.or.multimedia.messaging..Service.capabilities.defined.at.3GPP.typically.include.presence.[17].and.mes-saging.[18].or.conferencing.[19].

    The.OMA.specifications.for.service.enablers.are. the.most.advanced.and.complete..According.to.the.OMA,

    An.enabler.is.defined.as].a.technology.intended.for.use.in.the.devel-opment,.deployment.or.operation.of.a.service;.defined.in.a.specifica-tion,. or. group. of. specifications,. published. as. a. package. by. OMA.[20].An.enabler.should.specify.one.or.more.public.interfaces..Examples.of.OMA.enablers.include.location.or.device.management.[16].

    These.definitions.highlight.the.normative.character.of.an.enabler..A.com-ponent.or.a.technology.is.an.enabler.because.it.has.been.defined.as.an.enabler..Moreover,.when.individual.enablers.are.defined.independently,.each.enabler.has.to.define.all.functions.required.to.fulfill.its.requirements..This.implies.several.issues.for.the.service.providerespecially.the.difficulty.of.providing.user-centric.services:.Integration.and.deployment.of.services.is.complicated.and.expensive;.high.implementation.efforts.for.applications.wanting.to.use.

  • IMSService,Models,andConcepts 11

    several.capabilities;.there.is.no.common.integration.of.the.different.services.from.the.point.of.view.of.the.end.user.(e.g.,.no.common.group.management.or.user.profile.across.multiple.services).[16]..An.OMA.enabler.should.thus.contain.only.intrinsic.functions.that.can.interact.with.other.functions.from.the.service.architecture.or.from.underlying.network.architecture..Intrinsic.functions.are.defined.as.those.functions.that.are.essential.in.fulfilling.the.intended.task.of.the.specified.enabler..For.example,.the.position.calculation.function.is.intrinsic.to.secure.user.plane.location;.authentication.is.intrinsic.to.single.sign.on;.encryption.is.an.intrinsic.function.of.digital.rights.manage-ment.[16].

    This.separation.into.intrinsic.and.nonintrinsic.functions.is.a.way.of.ensur-ing.that.various.enablers.will.not.include.the.same.function.(e.g.,.authentica-tion.function.in.each.enabler)..As.specified.in.reference.16,.any.requirements.or.features.that.are.not.intrinsic.to.an.enabler.should.not.be.specified.within.the.enablers.specification..An.enablers.specification.should.only.specify.the.intrinsic.functionality.required.to.fulfill.its.actual.function..This.specifica-tion. of. service. functions. with. enablers. that. are. responsible. only. for. their.intrinsic.functions.enhances.the.ability.of.service.providers.to.offer.a.con-sistent. user. experience. (i.e.,. reuse. of. user. information,. service. continuity,.etc.)..However,.the.separation.into.intrinsic.and.nonintrinsic.functions.is.not.obvious.but.remains.subjective,.as.recognized.in.reference.16.(the.classifi-cation.of.intrinsic.and.non-intrinsic.is.subjective.and.needs.to.be.done.on.a.per.enabler.basis)..This.implies.again.that.the.definition.of.enablers.should.result.from.a.normative.process.

    The. OMA. has. specified. the. OMA. service. environment. (OSE). [16]. that.provides.a.common.architecture.for.the.integration.of.enablers.and.service.creation..As.shown.in.Figure.1.4,.the.OSE.architecture.consists.of.enablers.that.run.on.an.execution.environment.and.are.accessible.to.applications.and.other.enablers.through.a.policy.enforcer.

    Enablers.are.intended.for.use.in.the.development,.deployment,.or.opera-tion.of.a.service..They.provide.their.intrinsic.functionality.through.one.or.more.public.interfaces.called.I0.interfaces.and.may.use.underlying.network.resources.through.I2.interfaces.(such.as.IMS.interfaces).The.execution.envi-ronment.logically.encompasses.various.functions.such.as.process.monitoring,.software.life.cycle.management,.system.support.(e.g.,.thread.management,.load.balancing,.and.caching),.operation,.management,.and.administration..The.interface.between.the.execution.environment.and.enablers.is.called.an.I1.interface..The.policy.enforcer.provides.a.policy-based.management.mecha-nism. to.protect. resources. from.unauthorized. requests. and. to.manage. the.use.of.these.requestsfor.instance,.through.appropriate.charging,.logging,.and.enforcement.of.user.privacy.or.preferences..The.policy.enforcer.function.allows.the.domain.owner.to.extract.and.separate.policy.rules.from.architec-tural.elements..This.element.exposes. I0.+.P. interfaces. to.applications.and.enablers,.where.P.is.additional.parameters.that.must.be.provided.along.with.a.request.to.an.enablers.I0.interface,.when.the.policies.that.are.to.be.enforced.

  • 12 IPMultimediaSubsystem(IMS)Handbook

    require.additional.parameters..Applications.can.be.located.inside.or.outside.the.service.delivery.environment.

    IMS Service Model

    IMS Brings New Types of Services

    Traditionally,.telecommunications.services.are.divided.into.bearer.services,.teleservices,.and.supplementary.services..A.bearer.service.is.a.type.of.tele-communication.service.that.provides.the.capability.for.the.transmission.of.signals.between.user-network.interface.and.a.teleservice.is.a.type.of.ser-vice. that. provides. the. complete. capability,. including. terminal. equipment.functions,. for.communication.between.users.and.supplementary.service.modifies.or.supplements.a.basic.teleservice.[26]..Examples.of.basic.teleser-vice.are.telephony,.facsimile,.or.emergency.calls.

    These.notions.are.still.in.use.in.some.3GPP.or.TISPAN.standards.but.can.no.longer.be.used.by.a.service.provider.to.design.services..Indeed,.the.added.value.of.IMS.for.service.providers.is.the.ability.to.build.user-centric.services.that.flexibly.combine.several.features.and.enable.the.sharing.of.user.infor-mation.between.these.features.to.form.a.coherent.service.environment.for.the.user.[12]..As.explained.in.the.previous.section,.the.OMA.enabler.or.the.3GPP.service.capabilities.are.the.necessary.building.blocks.for.such.services..However,.a.model.for.IMS.services,.linking.the.services.from.users,.enablers,.and.technical.functions,.is.not.defined.in.standards.

    ApplicationsService Provider

    I0+P

    I0 I0

    I2I2I2

    I0

    EnablerI1

    Policy Enforcer

    EnablerEnabler

    Exec

    utio

    n En

    viro

    nmen

    t

    FIGure 1.4The.OMA.service.environment.architecture.[16].

  • IMSService,Models,andConcepts 13

    Transfer.and.control.functions.are.extensively.addressed.by.IMS.and.NGN.studies..Application.functions.are.partially.addressed.by.the.OMA.concern-ing. the. service. delivery. aspects. (with. the. OSE).. The. foreseen. services. for.IMS.will.require.a.coherent.integration.of.multiple.loosely.coupled.features..The.integration.between.these.features.should.be.considered.not.only.at.the.technical.level.(i.e.,.the.integration.within.a.service.delivery.environment.like.OSE).but.also.at.a.service.level.(i.e.,.how.the.composition.of.various.technical.functions.and.enablers.will.provide.a.coherent.service.experience.to.the.user)..If. the. integration.at. the. technical. level. is.well.addressed.by.the.OMA.and.ETSI.studies,.the.integration.at.the.service.level.has.not.been.investigated.

    To. answer. these. needs,. we. should. describe. the. relationships. between. a.service.perceived.by.the.user.and.the.technical.functions.and.enablers.used.to.implement.it.

    The.modeling.approach.is.organized.as.follows:

    modeling. the. link.between.services. that. is. seen.by. the.users. (e.g.,.a.user.is.aware.that.his.or.her.personal.information.is.shared.between.his.services);modeling. the. technical. functions. that. are. the. foundation. of. IMS;.technical.functions.are.those.carried.out.by.the.systems.(e.g.,.service.platforms,.terminals).controlled.by.the.service.providers;.andmodeling.IMS.service.architecture.based.on.service.enablers..Service.enablers.are.designed.for.the.reuse.of.the.user.information.between.services.and.for.easy.integration.of.new.services..As.seen.before,.ser-vice.enablers.contain.and.wrap.technical.functions.(intrinsic.func-tions)..We.propose.to.characterize.an.enabler.by.the.information.it.handles.and.by.the.technical.functions.it.wraps..For.instance,.only.one.service.enabler.can.produce.the.presence.information.and.can.wrap.the.technical.functions.linked.to.presence,.or.only.one.service.enabler.can.produce.the.location.information.and.can.wrap.the.tech-nical.functions.linked.to.location.

    The Link between Services Seen by the user

    The.first.step.is.to.define.clearly.what.a.service.is..There.is.a.lot.of.research.on.the.notion.of.servicenot.that.much.in.the.IT.area.but,.rather,.in.the.eco-nomic.and.business.sciences,.as.surveyed.in.Ben.Yahia.et.al..[21]..In.a.generic.way,.a.service.can.be.defined.as.any.business.actions.or.business.activities.that.have.a.value-added.result.for.a.user.(a.person.or.a.system)..This.action.or.activity.is.offered.by.a.service.provider.(another.person,.entity,.or.system),.which.profits.from.providing.this.action.[22,23].

    In.the.telecommunications.field,.a.telecom.service.is.defined.by.3GPP.as.a.component.of.the.portfolio.of.choices.offered.by.service.providers.to.a.user,.functionality.offered.to.a.user.[24].

    The.focus.area.of.this.study.is.service.usage;.hence,.we.concentrate.on.the.user.while.the.customer.is.outside.the.scope.of.IMS.services..The.customer.is.

  • 1 IPMultimediaSubsystem(IMS)Handbook

    a.person.or.organization.that.purchases.products.and.services.[25];.the.user.is.the.person.(or.system).who.uses.the.service.and.can.be.different.from.the.customer..For.example,.in.a.family,.the.customer.may.be.one.of.the.parents,.and.a.child.may.be.the.user.of.the.purchased.service..The.customer.usually.assigns.rights. to.users. to.use.the.services.he.or.she.has.obtained,.and.the.customer.can.be.a.user..Although.the.user.is.typically.a.person,.it.may.also.be.another.actor.(e.g.,.another.service.provider).

    Relying.on. the.preceding.service.definition,.we.propose.a.definition. for.IMS.services.as.follows:

    IMS.services.are.activities.that.take.place.in.interactions.between.a.user.(i.e.,. IMS. user). and. systems. controlled. by. service. providers. (e.g.,. IMS.user. equipment,. IMS. platforms).. These. activities. have. a. value-added.result.for.the.user;.and.the.service.providers.profit.from.providing.these.activities.

    In. this.definition.we.highlight. two.parties:. the.user.and. the.systems.con-trolled.by.the.service.providers.

    From.a.user.perspective,.the.purpose.of.IMS.services.is.to.establish.a.com-munication.session.between.users. that. is.adapted. to.user.preferences.and.context..The.session.manipulated.by.IMS.services.may.be.voice.sessions.but.can.also.be.video.sessions,.instant.messaging.sessions,.or.collaboration.ses-sions.. The. term. session. here. means. only. an. interactive. exchange. between.two.or.more.persons.in.order.to.communicate..From.a.user.perspective,.an.IMS.service.is.linked.to.his.or.her.identity.and.not.to.his.or.her.access.device.because.the.user.may.access.the.same.services.from.several.IMS.devices.

    When.using.IMS.services,.the.user.is.aware.that.applications.within.his.or.her.user.equipment.or.within.service.platforms.are.sharing.and.reusing.his.or.her.personal.information.such.as.presence.information,.availability.rules,.personal.profile,.contact.list,.or.location.information..A.given.service.will.be.responsible.for.the.creation.and.the.modification.of.each.type.of.information.(e.g.,.presence.service. for.presence. information,. location.service. for. location.information).. An. IMS. service. can. thus. consult. a. users. personal. informa-tion.(according.to.privacy.policies).and.may.be.responsible.for.defined.user.information.

    Figure.1.5. proposes. relationships. of. an. IMS. service,. an. IMS. public. user.identity,.and. the.users.personal. information..The. terms.of. IMS.service. in.this.figure.do.not.name.a.service.in.a.general.way.(e.g.,.presence.service).but.name.the.service.instance.of.one.specific.user.(e.g.,.Bobs.presence.service).

    Technical Functions

    From.a.service.provider.technical.perspective,.a.service.is.implemented.with.technical.functions..Technical.functions.are.the.functions.carried.out.by.sys-tems.controlled.by.the.service.providers.(e.g.,.service.platforms,.terminals)..As. seen. before,. the. IMS. service. architecture. may. be. divided. into. several.technical. functions..The.first.division. is.among.service.stratum.functions,.

  • IMSService,Models,andConcepts 1

    transport.stratum.functions,.and.end-user.functions..As.we.are.not.dealing.here.with.networking.issues,.we.will.focus.only.on.the.service.stratum..As.seen.in.the.first.section,.this.service.stratum.is.divided.among.service.control.functions,. service. user. profiles,. and. application. functions. [2].. In. addition,.end-user.functions.have.to.be.considered..They.are.not.part.of.the.service.stratum.but.are.closely.related.for.the.delivery.of.the.services.through.the.user.interface.

    Figure.1.6.classifies.the.IMS.(or.NGN).technical.functions,.according.to.the.NGN.standards.presented.in.the.first.section..The.service.stratum.functions.are.a.particular.type.of.technical.function..A.service.stratum.function.may.be:

    -is linked to-is responsible for

    *

    *

    IMS Public User Identity

    1

    1

    1

    *

    *

    *

    User Personal Information

    IMS Service

    -consult

    FIGure 1.5Links.seen.by.the.user.

    Transport Stratum Function

    Technical Function

    Service Stratum Function

    Service Control Function Service User Profile

    End-user Function

    Application Function

    FIGure 1.6IMS.technical.functions.

  • 1 IPMultimediaSubsystem(IMS)Handbook

    a. service. control. function. that. handles. common. control. functions.like.session.establishment.control.or.service.triggering.control;an. application. function. that. contains. the. service. logic. and. the.manipulation. rules. for. session. establishments. (e.g.,. transfers,. call-back,.reachability,.call.log);a.service.user.profile.that.stores.the.information.on.user.identities.and.on.service.triggering;.andan.end-user.function.that.includes.not.only.the.connection.to.the.IMS.(using.SIP.and.bearer.protocols).but.also.the.service.interface.part.that.resides.in.the.client.device..This.interface.performs.the.trans-formation.of.the.technical.messages.from.the.application.functions.into.something.usable.by.the.user.(and.vice.versa).and.thus.provides.the.end.user.with.the.ability.to.initiate.and.participate.in.a.session..For.example,.an.interface.for.presence.will.transform.the.presence.protocols.messages.into.a.user.interface.displaying.the.presence.of.the.users.contacts.

    relationship between Service and Technical Function

    An.IMS.service.is.the.junction.between.user.personal.information.and.tech-nical.functions..To.illustrate.this.in.Figure.1.7,.we.can.consider.the.example.of.an.IMS.presence.service..The.presence.service.is.seen.by.the.user.as.the.notification.of.presence.information.between.a.consumer.of.presence.infor-mation.and.sources.of.presence.information,.where.the.presence.information.is.a.set.of.attributes.characterizing.current.properties.of.the.sources.(such.as.status. or. communication. address). [17].. The. presence. service. is. performed.with.technical.functions.such.as.end-user.presence.clients.(a.presence.source.client.and.a.presence.watcher.client),. service.control.mechanisms. to. route.

    **

    1

    *

    *

    *

    -consult

    Technical Function

    User Personal Information

    -is responsible for

    -utilizesIMS Service

    FIGure 1.7IMS.service.

  • IMSService,Models,andConcepts 1

    presence.messages.(the.SIP.SUBSCRIBE,.PUBLISH,.and.NOTIFY.messages),.and.presence.application.servers.(to.process.the.presence.state.from.the.pres-ence.sources.and.to.store.and.send.it.to.the.watchers.that.have.subscribed.to.this.presence.event).

    The.services.are.directly.responsible. for. the.users.personal. information.and.are.utilizing. the. technical. functions.directly..As.mentioned,. this.may.lead.to.building.silo.architecture,.where.each.service.relies.on.its.own.tech-nical. functions..Service.enablers. (or.service.support.capabilities.or.service.capabilities). are. designed. to. address. this. issue. by. focusing. only. on. their.intrinsic.functions..This.means.that.there.should.be.no.overlap.between.the.service.enablers,.both.from.the.user.perspective.and.from.the.technical.func-tions.perspective.

    No.overlap.from.the.user.perspective.implies.that.different.service.enablers.should.not.be.responsible.for.the.same.type.of.users.personal.information..For.example,.only.one.service.enabler.can.produce.the.presence.information.and.only.one.service.enabler.can.produce.the.location.information.

    No.overlap.from.the.technical.functions.perspective.implies.that.the.differ-ent.service.enablers.should.not.use.the.same.IMS.functions.in.an.incoherent.way..For.example,.only.the.presence.service.enabler.can.process.the.presence.messages.and.store.the.presence.state.and.only.the.location.service.enabler.can.process.and.aggregate.user.location.from.various.location.sources.

    In.IMS.service.architecture,.the.IMS.services.have.to.rely.as.much.as.pos-sible.on.IMS.service.enablers..These.IMS.service.enablers.wrap.a.set.of.tech-nical. functions.and.provide.a. consistent. service. interface. to. IMS.services..An. IMS. service. might. also. use. some. technical. functions. directly. (e.g.,. an.application. server. dedicated. to. a. specific. service).. In. addition,. only. IMS.service.enablers.should.be.responsible. for. the.users.personal. information.(Figure.1.8).

    Example of the Push-to-Talk over Cellular

    In.order. to. illustrate. this.model,.we.apply. it.here. to. the.push-to-talk.over.cellular.(PoC).described.in.the.OMA.release.program.and.specifications.[27]..The.PoC.service. is.a.walkie-talkie. type.of.service. that.allows.rapid,.short,.and. spontaneous. communications.. It. is. a. half. duplex. voice. service. that.allows.person-to-person.and.person-to-group.communications..This.service.is. considered. an.early. example. of. IMS.application. in. the.market..Because.PoC.is.specified.as.both.a.service.and.an.enabler,.we.show.the.distinction.between.the.service.perceived.by.the.user.and.the.functional.service.build-ing.blocks.

    This.illustrates.the.separation.of.concern.from.what.is.seen.by.the.user,.the.service.enabler,.and.the.technical. functions.that. implement.these.enablers..

  • 1 IPMultimediaSubsystem(IMS)Handbook

    This.separation.will.benefit.service.providers.for.the.whole.service.life.cycleespecially.service.composition,.service.interaction,.and.service.management.

    PoC Service Seen from the users Perspective

    From.a.user.perspective,.a.typical.PoC.session.is.as.follows:

    The. PoC. user. opens. his. contact. list,. where. presence. features. indicate.whether. contacts. or. groups. of. contacts. are. available. or. not.. The. user.selects.one.or.more.contacts.in.his.contact.list,.creates.a.PoC.group.with.these.contacts,.starts.the.PoC.service,.and.then.talks.simultaneously.to.all.the.contacts.of.his.PoC.group.

    This.basic.session.shows.that.the.PoC.service.is.based.on.the.user.identity,.which. is.necessary. to.access. the.contact. list.and. invite.other.PoC.users. to.participate. in.a.session..Besides. identity,. from.a.user.perspective,. the.PoC.service.uses:

    presence. information. to. be. aware. of. contact. availability. and.reachability;contact.lists.to.create.groups.for.PoC.sessions;.anduser.profiles.

    Figure.1.9.shows.the.PoC.service.as.seen.by.user.Bob.Smith..This.view.contains.the.information.that.the.user.owns.and.that.is.reused.in.the.PoC.ser-vice..His.personal.information.could.be.reused.as.in.another.IMS.service.

    IMS Service

    User Personal Information

    IMS Service Enabler

    Technical Function

    -utilizes

    -wrap1

    -is responsible for

    -consult-consult

    -utilizes

    *

    **

    *

    *

    **

    *

    **

    **

    1-requires

    FIGure 1.8IMS.services.and.service.enablers.

  • IMSService,Models,andConcepts 1

    PoC Service and Service enablers

    As.described. in. the.OMA.specifications,. the.PoC.service. requires. several.service.enablers.that.perform.specific.actions.and.are.responsible.for.spe-cific.information:

    push-to-talk.over.cellular.enabler.[27].that.manages.the.service.logic.of.the.PoC.service;XDM.(XML.document.management).enabler.[28].to.handle.the.con-tact.groups.in.particular;presence.enabler.[29];IMS.enabler.[30].to.support.the.service;.anddevice.management.enabler.[31].

    The.dependencies.between.the.PoC.service.and.the.service.enablers.and.also.between.the.service.enablers.are.described.in.Figure.1.10.with.dotted.arrows..Each.service.enabler.is.responsible.for.some.type.of.personal.information.

    Technical Functions for PoC Service

    As.mentioned.before,.each.service.enabler.is.implemented.and.carried.out.via.a.set.of.technical.functions.that.are.shown.in.Figure.1.11..In.this.section.we.split.each.enabler.into.its.corresponding.technical.functions.

    The.XML.document.management.(XDM).enabler.is.implemented.with.an.XDM.client.(XDMC),.a.shared.XDM.server.(shared.XDMS),.and.an.aggrega-tion.proxy..The.XDMC.is.an.XCAP.(XML.configuration.access.protocol).client.

    Another Service of Bob : IMS Service

    Bob Identity : IMS Public User Identity

    Bob Presence Information : User Personal Information

    PoC Service of Bob : IMS Service

    Bob Profile : User Personal Information Bob Contact List : User Personal Information

    FIGure 1.9PoC.service.as.seen.by.Bob.Smith.

  • 20 IPMultimediaSubsystem(IMS)HandbookBo

    b Pr

    ofile

    : Use

    r Per

    sona

    l Inf

    orm

    atio

    n

    PoC

    Serv

    ice o

    f Bob

    : IM

    S Se

    rvice

    Bob

    Pres

    ence

    Sim

    ple :

    IMS

    Serv

    ice E

    nabl

    er

    OM

    A Po

    C : I

    MS

    Serv

    ice E

    nabl

    er

    OM

    A XD

    M : I

    MS

    Serv

    ice E

    nabl

    er

    IMS

    in O

    MA

    : IM

    S Se

    rvice

    Ena

    bler

    OM

    A D

    evice

    Man

    agem

    ent :

    IMS

    Serv

    ice E

    nabl

    er

    Bob

    Pres

    ence

    Info

    rmat

    ion

    : Use

    r Per

    sona

    l Inf

    orm

    atio

    n

    Bob

    Cont

    act L

    ist : U

    ser P

    erso

    nal I

    nfor

    mat

    ion

    FIG

    ur

    e 1.

    10Se

    rvic

    e.en

    able

    rs.fo

    r.Po

    C.s

    ervi

    ce.

  • IMSService,Models,andConcepts 21

    that.gives.access.to.XML.documents.stored.in.the.network.(e.g.,.PoC-specific.documents.in.the.PoC.XDMS,.contact.lists.in.the.shared.XDMS)..The.aggrega-tion.proxy.acts.as.the.single.contact.point.for.the.XDMC..It.performs.authenti-cation.of.the.XDMC.and.routes.individual.XCAP.requests.to.the.correct.XDMS..The.shared.XDMS.is.an.XCAP.server.that.manages.XML.documents.(e.g.,.con-tact.lists).that.are.shared.with.other.service.enablers.(e.g.,.presence).

    The.PoC.enabler.is.implemented.into.a.client.part,.a.server.part,.and.a.PoC-.specific.XDM.server..The.PoC.client.resides.on.the.terminal.and.is.used.to.access.the.PoC.service..The.PoC.server.implements.the.application.logic.for.the.PoC.service..The.PoC-specific.XDM.server.is.an.XCAP.server,.which.man-ages.XML.documents.that.are.specific.to.the.PoC.service.(e.g.,.PoC.groups).

    The. presence. enabler. is. implemented. on. a. presence. server,. a. presence.source,.and.a.watcher..A.presence.server.is.an.entity.that.accepts,.stores,.and.distributes.presence.information.about.PoC.clients..A.presence.source.is.an.entity. that.provides. (publishes).presence. information,.and.a.watcher. is.an.entity.that.is.notified.from.presence.information.

    The. IMS.enabler. includes.a.number.of.SIP.proxies.and.SIP.registrars.. It.performs. functions. such. as. authentication,. authorization. of. PoC. user,. or.maintaining.of.the.registration.state.

    The.device.management.enabler. is. implemented.with.a.device.manage-ment.client. that.receives.the. initial.parameters.needed.by.the.service.pro-vider.for.the.PoC.client.and.a.device.management.server.that.initializes.the.entire.configuration.and.updates.necessary.for.the.PoC.client.

    DM Client

    DM Server

    Presence Source

    PoC Subscriber/User

    Watcher

    XDMC

    PoC Client

    UE

    Presence Server Shared

    XDMS

    Aggregation Proxy

    PoC XDMs

    PoC Server

    SIP/

    IP C

    ore

    FIGure 1.11Technical.functions.of.the.PoC.service.(simplified).

  • 22 IPMultimediaSubsystem(IMS)Handbook

    All. technical. functions. described. here. belong. to. the. service. stratum..They.are.thus.end-user.functions,.service.control. functions,.or.application.functions..PoC.client,.XML.document.management.client,.presence.source,.watcher,.and.device.management.client.are.end-user.functions..IMS.core.is.a. service. control. function.. PoC. server,. PoC. XML. document. management.server,. aggregation. proxy,. shared. XML. document. server,. presence. server,.and.device.management.server.are.application.functions.

    A Comprehensive View of IMS Services

    Figure.1.12.is.an.example.of.the.three.enablers.OMA.XDM,.IMS.in.OMA,.and.OMA.presence.SIMPLE..It.defines.the.suitable.dependencies.of.these.three.enablers.and.with.the.services.that.make.use.of.these.enablers..We.take.here.the.examples.of.the.PoC.service.and.of.an.instant.messaging.service..All.the.enablers.used.by.these.services.are.not.represented.in.order.to.simplify.the.figure.

    Conclusion

    IMS. services. cannot. be. considered. independently. from. the. whole. service.environment.of.the.user.[32]..This.environment.includes.at.least.features.such.as.identity.management,.community.management,.availability.management,.or.context.management..This.service.environment.should.be.able.to.integrate.third-party.service.elements..The.service.value.will.reside.in.the.quality.of.the.interactions.between.all.the.service.elements.and.in.seamless.accessibil-ity.in.a.user-centric.way..A.service.control.framework.handling.these.interac-tions.is.therefore.needed.for.the.interactions.between.the.operator.services.and.for.intermediation.with.other.service.providers..This.framework.should.rely.on.a.common.modeling.for.services,.service.enablers,.and.resources.

    The. main. interest. of. the. proposed. approach. lies. in. the. identification. of.the.dependencies.between.the.services.and.the.service.enablers..This.allows.better.design.of.the.IMS.services.by.defining.clearly.which.service.enabler.is.involved.in.which.service.and.how.a.service.enabler.is.linked.to.techni-cal.functions..This.approach.optimizes.the.treatment.of.service.interaction.between.IMS.service.enablers.by.tracing.the.impact.on.the.user.perception.of. the.service.. It.will.also.enhance.service.management.aspects.by.detect-ing. how. the. failure. of. one. or. many. technical. functions. can. affect. service.enablers.and.the.use.of.the.IMS.service..It.is.a.tool.to.identify.the.user.per-sonal.information.that.should.be.shared.between.services,.to.define.which.service.enabler.is.responsible.for.which.information,.and.then.to.design.ser-vices.that.reuse.this.personal.information.through.these.service.enablers.

  • IMSService,Models,andConcepts 23

    Insta

    nt M

    essa

    ging

    Ser

    vice

    of B

    ob : I

    MS

    Serv

    ice

    Shar

    ed X

    ML

    Doc

    umen

    t Man

    agem

    ent S

    erve

    r : A

    pplic

    atio

    n Fu

    nctio

    n

    XML

    Doc

    umen

    t Man

    agem

    ent C

    lient

    : End

    -use

    r Fun

    ctio

    n

    Aggr

    egat

    ion

    Prox

    y : A

    pplic

    atio

    n Fu

    nctio

    n

    IMS

    Core

    : Ser

    vice

    Con

    trol F

    unct

    ion

    Pres

    ence

    Ser

    ver :

    App

    licat

    ion

    Func

    tion

    Pres

    ence

    Sou

    rce :

    End

    -use

    r Fun

    ctio

    n

    Wat

    cher

    : End

    -use

    r Fun

    ctio

    n

    IMS

    in O

    MA

    : IM

    S Se

    rvice

    Ena

    bler

    OM

    A XD

    M : I

    MS

    Serv

    ice E

    nabl

    er

    PoC

    Serv

    ice o

    f Bob

    : IM

    S Se

    rvice

    Bob

    Pres

    ence

    Info

    rmat

    ion

    : Use

    r Per

    sona

    l Inf

    orm

    atio

    n

    OM

    A Pr

    esen

    ce S

    IMPL

    E : I

    MS

    Serv

    ice E

    nabl

    er

    FIG

    ur

    e 1.

    12R

    elat

    ion

    ship

    .and

    .dep

    end

    enci

    es.o

    f.XD

    M,.I

    MS,

    .and

    .pre

    senc

    e.si

    mpl

    e.se

    rvic

    e.en

    able

    rs.

  • 2 IPMultimediaSubsystem(IMS)Handbook

    Glossary

    3GPP 3rd.Generation.Partnership.ProjectAPI. . application.programming.interfaceAS. . application.serverCSCF. . call.state.control.functionsDSL. . digital.subscriber.lineGSM. . global.system.for.mobile.communicationsGUI. . graphical.user.interfaceHSS. . home.subscriber.serverIETF. . Internet.Engineering.Task.ForceiFC. . initial.filter.criteriaIMS. . IP.multimedia.subsystemIN. . intelligent.networkINAP. . intelligent.network.application.protocolISDN. . integrated.services.digital.networkISUP. . ISDN.user.partIT. . information.technologyITU. . International.Telecommunication.UnionNGN. . Next-generation.networksOMA. . Open.Mobile.AllianceOSE. . OMA.service.environmentPSTN. . public.switched.telephone.networkS-CSCF.. serving.call.state.control.functionsSIB. . service.independent.building.blockSIP. . session.initiation.protocolSIM. . subscriber.identity.moduleSPT. . service.point.triggerTISPAN.. telecommunication.and.Internet.converged.services.and...

    . protocols.for.advanced.networkingUMTS. . universal.mobile.telecommunications.systemWLAN.. wireless.local.area.networkXML. . extensible.markup.languageTMF. . TeleManagement.Forum

    References

    . 1.. Arbanowski,.S..et.al..2004..I-centric.communications:.Personalization,.ambient.awareness,.and.adaptability. for. future.mobile.services.. IEEE Communications Magazine.42(9):6369.

  • IMSService,Models,andConcepts 2

    . 2.. Knightson,.K.,.N..Morita,.and.T..Towle..2005..NGN.architecture:.Generic.prin-ciples,.functional.architecture,.and.implementation..IEEE Communications Mag-azine.43(10):4956.

    . 3.. 3GPP..IP.multimedia.subsystem.(IMS),.TS.23.228.

    . 4.. Bertin,.E.,.E..Bury,.and.P..Lesieur..2003..Operator.services.deployment.with.SIP:.Wireline.feedback.and.3GPP.perspectives..ICIN.2003,.Bordeaux,.April.2003.

    . 5.. Schulzrinne,. H.,. and. J.. Rosenberg.. 1999.. Internet. telephony:. Architecture.and. protocolsAn. IETF. perspective.. Computer Networks and ISDN Systems.31(3):237255.

    . 6.. Tang,.B..Y..C..2005..Evolving.to.wireless.and.wireline.convergenceAn.over-view.of.IMS..Wireless.and.Optical.Communications,.2005..14th.Annual.WOCC.2005,.27,.April.2223.

    . 7.. Marquez,. F.. G.,. M.. G.. Rodriguez,. T.. R.. Valladares,. T.. de. Miguel,. and. L.. A..Galindo.. 2005.. Interworking. of. IP. multimedia. core. networks. between. 3GPP.and.WLAN..IEEE Wireless Communications.12(3):5865.

    . 8.. Lin,.F..J..2005..A.survey.on.wireless/wireline.integration..Wireless.and.Optical.Communications,.2005..14th.Annual.WOCC.2005,.26,.April.2223.

    . 9.. 3GPP..IP.multimedia.session.handling;.IM.call.model,.TS.23.218.

    . 10.. Schilit,.B..N.,.D..M..Hilbert,.and.J..Trevor..2002..Context-aware.communication..IEEE Wireless Communications.9(5):4654.

    . 11.. Raento,.M.,.A..Oulasvirta,.R..Petit,.and.H..Toivonen,.H..2005..ContextPhone:.A.prototyping.platform.for.context-aware.mobile.applications..IEEE Pervasive Computing.4(2):5159.

    . 12.. Bertin,.E.,.E..Bury,.and.P..Lesieur..2002..Next-generation.architectures:.Which.roles.for.an.incumbent.operator?.Proceedings.of.the.Eurescom.Summit.2002.

    . 13.. Bertin,.E.,.E..Bury,.and.P..Lesieur..2004..Intelligence.distribution.in.next-gen-eration. networks,. an. architectural. framework. for. multimedia. services.. IEEE.International.Conference.on.Communications,.ICC.2004,.Paris.

    . 14.. Gouya,.A.,.N..Crespi,.and.E..Bertin..2006..SCIM.(service.capability.interaction.manager)..Implementation.issues.in.IMS.service.architecture..IEEE International Conference on Communications, Istanbul.

    . 15.. Carugi,.M.,.B..Hirschman,.and.A..Narita..2005..Introduction.to.the.ITU-T.NGN.focus. group. release. 1:. Target. environment,. services,. and. capabilities.. IEEE Communications Magazine.43(10):4248.

    . 16.. OMA.. OMA. service. environment.. Approved. version. 1.0.4,. 01. Feb. 2007,.OMA-AD-Service-Environment-V1_0_4-20070201-A.

    . 17.. 3GPP..Presence.service.using.the.IP.multimedia.(IM).core.network.(CN).sub-system;.TS.24.141.

    . 18.. 3GPP..Messaging.using.the.IP.multimedia.(IM).core.network.(CN).subsystem;.TS.24.247.

    . 19.. 3GPP..Conferencing.using.the.IP.multimedia.(IM).core.network.(CN).subsys-tem;.TS.24.147.

    . 20.. OMA.. Dictionary. for. OMA. specifications.. Approved. version. 2.6,. June. 2007,.OMA-ORG-Dictionary-V2_6-20070614-A.

    . 21.. Ben.Yahia,.I.,.E..Bertin,.N..Crespi,.and.J..P..Deschrevel..2006..Service.definition.for. next-generation. networks.. International. Conference. on. Networking.. ICN.2006,.Mauritius.

    . 22.. Lovelock,.C..2001..Services marketing, people, technology, strategy,.4th.ed..Engle-wood.Cliffs,.NJ:.Prentice.Hall.

  • 2 IPMultimediaSubsystem(IMS)Handbook

    . 23.. Grnroos,. C.. 2000.. Service management and marketing: A customer relationship management approach,.2nd.ed..Chichester,.UK:.John.Wiley.&.Sons.

    . 24.. 3GPP..2005..3GPP.definition,.TR.21.905,.V6.7.0.

    . 25.. TMF.Forum..Shared.information.and.data.(SID).model..GB922.and.addenda,.release.7,.January.2007.

    . 26.. Keck,.D..O.,.and.P..J..Kuehn..1998..The.feature.and.service.interaction.problem.in.telecommunications.systems:.A.survey..IEEE Transactions on Software Engi-neering.24(10):779796.

    . 27.. OMA..OMA.push.to.talk.over.cellular.(PoC)..Approved.enabler.version.1.0.2,.September.2007.

    . 28.. OMA.. OMA. XML. document. management.. Approved. enabler. version. 1.0.1,.November.2006.

    . 29.. OMA..OMA.presence.simple..Approved.enabler.version.1.0.1,.November.2006.

    . 30.. OMA..IMS.in.OMA..Approved.enabler.version.1.0,.September.2005.

    . 31.. OMA..OMA.device.management..Approved.enabler.version.1.2,.February.2007.

    . 32.. Ryu,.S..et.al..2005..Research.activities.on.next-generation.mobile.communica-tions.and.services.in.Korea..IEEE Communications Magazine.43(9):122131.

  • 27

    2IMSASecureArchitectureforAllIPNetworks

    Muhammad Sher and Thomas Magedanz

    CONTENTS

    Introduction............................................................................................................28IMS.Architectural.Overview................................................................................ 29IMS.Security.Challenges.and.Potential.Attacks................................................ 32IMS.Security.Mechanisms.and.Security.Associations.....................................35IMS.Authentication,.Key.Management,.and.Secrecy....................................... 39

    IMS.Authentication.and.Key.Management.............................................. 39Encryption.and.Secrecy............................................................................... 41

    Use.of.IPsec.ESP.for.SIP.Confidentiality.and.Integrity.Protection............................................................................43

    SIP.Integrity.and.Confidentiality.Procedure................................44Interdomain.Security............................................................................................45

    Network.Domain.Security.(NDS).Architecture....................................... 47Use.of.IPsec.in.an.NDS/IP.Environment..................................................50Public.Key.Infrastructure.(PKI)..................................................................53PKI-Based.NDS.Authentication.Framework.............................................55

    Security.Management.for.HTTP-Based.Services.............................................. 59Generic.Bootstrapping.Architecture.(GBA).............................................. 59Bootstrapping.Authentication.Procedure................................................. 62Bootstrapping.Usage.Procedure.................................................................64Authentication.Proxy.Usage.for.Multimedia.Services............................64

    References............................................................................................................... 67

  • 2 IPMultimediaSubsystem(IMS)Handbook

    Introduction

    The.fixed-mobile.convergence.(FMC).and.voice-data.networks.have.merged.next-generation,. value-added. applications. and. integrated. multimedia. ser-vices,. combining. Web. browsing,. instant. messaging,. presence,. voice. over.Internet.protocol.(VoIP),.video.conferencing,.application.sharing,.telephony,.unified.messaging,.multimedia.content.delivery,.etc..on.top.of.different.net-work. technologies.. The. 3GPP. (3rd. Generation. Partnership. Project). [1]. and.3GPP2.[2].have.developed.the.IP.multimedia.subsystem.(IMS).[3].to.provide.a.service.delivery.platform.(SDP).for.a.converged.communication.paradigm..No.doubt,. the. convergence.of.voice.and.data.networks. is.a.great.achieve-ment.to.maintain.a.single.communication.platform.for.all,.but.the.greatest.challenge.is.to.maintain.an.adequate.level.of.security.in.the.heterogeneous.network.environment.to.protect.multiple.technologies.and.protocols.and.to.provide.data.confidentiality.and.protection.

    Another.important.development.in.the.converged.networks.paradigm.is.the.introduction.of.IP.as.the.network.layer.in.the.GPRS.(general.packet.radio.service).and.in.the.UMTS.(universal.mobile.telecommunication.system).net-work.domain..The.IP-based.network.architecture.provides.open.and.flexible.interfaces.to.deploy.innovative.services..In.terms.of.security,.this.implies.an.array.of.new.threats.and.risks.inherited.from.the.Internet.world.

    The.IMS.is.also.vulnerable.to.different.peer-to-peer.attacks.because.users.are.always.connected.and.online..The.possible.reasons.for.passive.and.active.attacks.in.IMS.are.that.an.attacker.could.easily.access.a.wireless.link,.launch.a.falsely.based.station,.and.redirect.attacks.to.intercept.and.redirect.a.users.confidential.information.somewhere.else.

    IMS.utilizes.SIP.(session.initiation.protocol).[4].for.signaling,.which.is.open.architecture.and.vulnerable.to.different.attacks,.as.discussed.in.Calhoun.et.al..[5]..The.IMS.core.threats.include.flooding.attacks,.which.ultimately.keep.the.network.resources.busy,.and,.as.a.result,.these.sources.are.not.available.to.legitimate.users..The.IMS.application.servers.(ASs).are.also.valuable.targets.for. intruders. because. they. provide. value-added. services.. Due. to. the. text-based.nature.of.SIP,.the.IMS.and.AS.are.vulnerable.to.attacks.like.spoofing,.hijacking,.and.message.tampering..Moreover,.the.AS.may.suffer.from.HTTP-based.threats..Finally,.intruders.may.launch.denial.of.service.(DoS).attacks.against.applications.installed.on.the.AS.

    In.order.to.minimize.the.risk.of.theft.of.information.and.data.from.hackers,.we.have.to.focus.on.an.independent.security.framework.for.IMS..According.to.3GPP.technical.specifications.and.standards,.IMS.security.provides.two.solutions.at.different.levels.of.protection:

    . 1..The.early.IMS.security.solution.standardized.in.3GPP.release.5.pro-vides. limited.security. functionality.and.aims.to.protect.early.IMS.deployment. and. offers. less. security.. It. provides. authentication. of.

  • IMSASecureArchitectureforAllIPNetworks 2

    subscribers. for. services. access. and. identity. confidentiality. on. the.radio.interface..It.also.provides.radio.interface.encryption.

    . 2..The.complete.IMS.security.solution.is.standardized.in.3GPP.release.6.with. full. security. functionality.and.builds.on. the.early. security.solutions.with.the.objective.to.improve.them..It.offers.new.security.features.and.secures.new.services.to.protect.networks.and.terminals.with.data.protection.

    This. chapter. presents. an. IMS. overview. and. addresses. IMS. potential.attacks.. It.presents.an.overview.of. IMS.security.architecture.and.security.associations,.as.well.as.key.authentication,.key.generation,.and.use.of.keys.to.provide.confidentiality.and.integrity..Later,.it.discusses.interdomain.security.and.presents.IMS.HTTP-based.services.security..Finally,.it.presents.security.extension.for.new.threats.

    IMS Architectural Overview

    The. IMS. [3]. provides. SDP. for. mobile. multimedia. services. provisioning,.such. as. VoIP,. video-telephony,. multimedia. conferencing,. mobile. content,.and.push-to-talk..It.is.based.on.Internet.Engineering.Task.Force.(IETF).pro-tocols. like.SIP.[4],.DIAMETER.[8],.SDP,.real-time.transport.protocol.(RTP),.and.transfer.control.protocol.(TCP)/IP.protocol.stack..The.IMS.is.considered.as.the.next-generation.service.delivery.platform.framework..It.consists.of.a.modular.design.with.open.interfaces.and.enables.the.flexibility.for.provid-ing.multimedia.services.over.IP.technology..The.IMS.does.not.standardize.specific. services.but,. rather,.uses. standard.service.enablers. (e.g.,.presence).and.inherently.supports.multimedia.and.VoIP.

    In.the.IMS.architecture,.the.SIP.protocol.[4].is.used.as.the.standard.signal-ing.protocol.that.establishes,.controls,.modifies,.and.terminates.voice,.video,.and.messaging.sessions.between.two.or.more.participants..The.related.sig-naling.servers.in.the.architecture.are.referred.to.as.call.state.control.functions.(CSCFs).and.are.distinguished.by.their.specific.functionalities..The.function-ality.related.to.authentication,.authorization,.and.accounting.(AAA).within.the. IMS.is.based.on.the. IETF.DIAMETER.protocol. [6].and. is. implemented.in. the. home. subscriber. system. (HSS),. CSCFs,. and. various. other. IMS. com-ponents.in.order.to.allow.charging.functionality.within.the.IMS..Instead.of.developing. the. protocol. from. scratch,. DIAMETER. is. based. on. the. Remote.Authentication. Dial-in-User. Service. (RADIUS). [7],. which. has. previously.been.used.to.provide.AAA.services.for.dial-up.and.terminal.servers.across.environments.

    The.other.protocol.that.is.important.for.multimedia.contents.is.real-time.transport.protocol.(RTP).[8],.which.provides.end-to-end.delivery.for.real-time.data..It.also.contains.end-to-end.delivery.services.like.payload-type.(codec).

  • 30 IPMultimediaSubsystem(IMS)Handbook

    identification,.sequence.numbering,.time.stamping,.and.delivering.monitor-ing.for.real-time.data..The.RTP.provides.quality.of.service.(QoS).monitoring.using.the.RTP.control.protocol.(RTCP).[9],.which.conveys.information.about.media.session.participants.

    The. IMS. entities. and. key. functionalities. can. be. classified. in. six. catego-ries.[10]:.session.management.and.routing.family.(CSCFs),.databases.(HSS,.SLF),.interworking.elements.(BGCF,.MGCF,.etc.),.services.(application.server,.MRCF,.MRFP),. support. entities. (THIG,. security. gateway. [SEG],. PDF),. and.charging.. The. most. important. components. and. parts. of. IMS. architecture.(shown.in.Figure.2.1).are.described.as.follows:

    Proxy call state control function (P-CSCF).is.the.first.contact.point.within.the.IP.multimedia.core.network;.all.SIP.signaling.traffic.from.or.to.the.user.equipment.(UE).traverse.via.the.P-CSCF..Its.address.is.dis-covered.by.the.UE.following.the.packet.data.protocol.(PDP).context.activation..The.P-CSCF.behaves.like.a.proxy,.accepting.and.forward-

    IMS Core

    HSS Cx Cx

    Sh

    Mw

    IMS Clients

    Mw Mw

    ISC

    Mw

    Media Server

    Media GW

    Legacy networks

    GSM, PSTN

    Signalling GW

    IMS Application Platform

    XDMS

    Parlay X GW SIP AS

    Presence Charging

    P-CSCF

    S-CSCF Mw

    I-CSCF

    Gm

    FIGure 2.1IMS.architecture.

  • IMSASecureArchitectureforAllIPNetworks 31

    ing.requests.and.responses..It.performs.functions.like.authorizing.the.bearer.resources.for.the.appropriate.QoS.level,.emergency.calls,.monitoring,.header.(de)compression,.and.identification.of.I-CSCF.

    Interrogating call state control function (I-CSCF).is.the.first.contact.point.within.an.operators.network..It.contacts.the.HSS.to.get.the.address.of.S-CSCF.to.serve.the.user.for.registration..It.forwards.SIP.requests.and.responses.to.S-CSCF..It.also.performs.network.topology.hiding.functionality.

    Serving call state control function (S-CSCF).performs.the.session.control.services.for.the.end.point.and.maintains.session.state.as.needed.by.the. network. operator. for. support. of. the. services.. Within. an. oper-ators. network,. different. S-CSCFs. may. have. different. functional-ities.. The. important. functions. performed. by. S-CSCF. include. user.registration/interaction. with. service. platforms. for. the. support. of.services..The.S-CSCF.decides.whether.an.AS.is.required.to.receive.information. related. to. an. incoming. SIP. session. request. to. ensure.appropriate.service.handling..The.decision.at. the.S-CSCF.is.based.on. filter. information. received. from. the. HSS. [10].. This. filter. infor-mation.is.stored.and.conveyed.on.a.per-application-server.basis.for.each.user.

    Home subscriber server (HSS).is.the.equivalent.of.the.HLR.(home.location.register). in. 2G. systems. but. extended. with. two. DIAMETER-based.reference.points..It.is.the.master.database.of.an.IMS.that.stores.IMS.user.profiles,.including.individual.filtering.information,.user.status.information,.and.application.server.profiles.

    Application server (AS).provides.service.platforms.in.IMS.environments..It.does.not.address.how.multimedia/value-added.applications.are.programmed;.only.well.defined.signaling.and.administration.inter-faces. (IMS. service. control. [ISC]. and. Sh). and. SIP. and. DIAMETER.protocols.are.supported..This.enables.developers.to.use.almost.any.programming.paradigm.within.a.SIP.AS,.such.as.legacy.intelligent.network.servers.(i.e.,.CAMEL.support.environments);.open.service.access.(OSA)/Parlay.servers/gateways;.or.any.proven.VoIP.SIP.pro-gramming.paradigm.like.SIP.servlets,.call.programming.language.(CPL),.and.common.gateway.interface.(CGI).scripts.[11]..The.SIP.AS.is.triggered.by.the.S-CSCF,.which.redirects.certain.sessions.to.the.SIP.AS.based.on.the.downloaded.filter.criteria.or.by.requesting.filter.information. from. the. HSS. in. a. user-based. paradigm.. The. SIP. AS.comprises.filter.rules.to.decide.which.of.the.applications.deployed.on. the.server. should.be. selected. for.handling. the.session..During.execution.of.service.logic,.it.is.also.possible.for.the.SIP.AS.to.commu-nicate.with.the.HSS.to.get.additional.information.about.a.subscriber.or.to.be.notified.about.changes.in.the.profile.of.the.subscriber.[12].

    Media resource function (MRF).can.be.split.into.media.resource.function.controller.(MRFC).and.media.resource.function.processor.(MRFP)..

  • 32 IPMultimediaSubsystem(IMS)Handbook

    It.provides.media.stream.processing.resources. like.media.mixing,.media.announcements,.media.analysis,.and.media. transcoding.as.well.as.speech.[10]..The.other.three.components.are.border.gateway.control.function.(BGCF),.media.gate.control.function.(MGCF),.and.media.gate.(MG),.which.perform.the.bearer.interworking.between.RTP/IP.and.the.bearers.used.in.the.legacy.networks.

    IMS end-user system. provides. the. necessary. IMS. protocol. support,.namely.SIP,.and.the.service-related.media.codecs.for.the.multimedia.applications.in.addition.to.the.basic.connectivity.support.(e.g.,.GPRS,.wireless.local.area.network.[WLAN]).

    IMS Security Challenges and Potential Attacks

    The.security.challenges.facing.IMS.are.threats.from.different.domain.proto-colsfor.example,.SIP.signaling.attacks,.RTP.media.attacks,.and.IP.domain.attacks.. Some. of. the. potential. IMS. attacks. are. identified. in. reference. 13..The. IMS. security. challenges. are. DoS. attacks,. threats. from. open-based. IP.infrastructure,.and.SIP.signaling.and.media.flow.attacks,.as.depicted.in.Fig-ure.2.2..These.threats.are.summarized.as.follows:

    Denial-of-service (DoS) attack:. This. jams. radio. signals. and. floods. by.authentication.requests.to.P-CSCF.and.other.devices..For.example,.in. a. REGISTER. flooding. attack,. the. attacker. sends. many. REGIS-TER.requests.to.the.P-CSCF.with.fake.or.spoofed.source.addresses.(e.g.,. SIP. URI. [uniform. resource. identifier]).. In. the. case. of. distrib-uted.REGISTER.flooding,.the.attacker.generates.multiple.REGISTER.requests.with.different.spoofed.and.faked.source.addresses.to.over-whelm.the.IMS.resources..It.causes.downfall.of.IMS.resources.and.the.legitimate.users.cannot.get.the.services.

    Spoofing attack:.The.malicious.node.hides. its.presence. in. the.network.and. intercepts. traffic,. and. attackers. tamper. with. messages.. These.nodes.become.trusted.nodes.in.IMS.

    Man-in-the-middle attack:. Hackers. search. the. breaches. and. break. the.authentication.process.and.integrity.protection.process.in.order.to.get.IMS.services.for.free.

    Impersonation:.Impersonating.a.server.causes.misrouting.of.messages..The. existing. authentication. processes. are. unable. to. differentiate.between.the.intruder.and.the.legitimate.user..This.way.the.attacker.has. free. access. to. IMS. services. and. the. victim. is. charged. for. the.attackers.usage.of.services.

  • IMSASecureArchitectureforAllIPNetworks 33

    Eavesdropping:.Hackers.get.session.information.if.messages.are.sent.i