Course PDF
Course PDF
Thoroughly study the IMS in a single weeklong class. Course Code: 3255
In a single weeklong class, you will thoroughly study the IMS, including
relevant wireless access systems that are used by the IMS. You will begin by On-Site Learning
studying the systems surrounding the IMS to gain a clear vision of the big
picture. Once you understand where the IMS fits into the PSTN, you will study 5 Day Course
the IMS architecture through a process of lecture and hands-on training. You
will learn key IMS protocols including SIP, SDP, H.248, COPS, and Diameter. Partner-delivered Course
Learn what each IMS component is and how it functions in an actual test
network. The lessons in this course are clear, very technical, and always
practical. Since at least 40% of them are hands-on, you can investigate and
reinforce each lesson. In this course, you'll examine how IMS weaves into the
current telecommunications network-both wired and wireless.
• 3GPP
• 3GPP2
• IETF
• Open Mobile Alliance (OMA)
• TISPAN
3. IMS Architecture
• Components
◦ HSS
◦ Proxy-CSCF
◦ Serving CSCF
◦ Interrogating-CSCF
◦ Policy Decision Function
• SIP Protocol IntroductionIMS Identifiers
• IMS Message Paths Introduction (Via and Record-Route)
• The Service Path
• Initial Filter Criteria Introduction
• SDP Introduction
Day 2
• Gm, Mw, Cx, Dx, Sh, Si, Dh, Mm, Mg, Mi, Mj, Mk, Ut, Mr, Mp, Go, Gq
• Specific Analysis of the Cx and Dx Interfaces
• DIAMETER
Day 3
8. IMS Identifies
• IMSI
• UICC
• Home Network, Public ID, Private ID
• SIP IRU Format
• P-Access-Network-Info
• P-Charging-Vector:, P-Preferred-Identity:, P-Asserted-Identity:,
Authorization:
• Security-Client:, Security-Server:
• IMS Signaling Compression (SigComp Architecture)
• Session Parameters
• SDP Format
• Extending SDP
• SDPng
• Media Negotiation
• Changing Session Parameters
• T1, T2, T4
• Timers A-K
Day 4
• DNS Basics
◦ A-Record
◦ The SRV Record (RFC2782)
◦ How SIP uses the SRV Record (RFC3263 Locating SIP Servers)
◦ How to Configure a SRV Record
◦ The NAPTR Record (RFC2915)
• How the P-CSCF Locates the I-CSCF
• Introduction to ENUM (RFC3761: ENUM Protocol)
• How the S-CSCF uses ENUM
• Registration
• Service Discovery
• Identity Modules
• IMS Authentication and Key Agreement (User Identities)
• Service TriggersInitial Filter Criteria
• Network Domain Security
• Secure HTTP-Based Service
• Controlling Bearer Traffic
• Controlling the Media
• Anonymous Calling (Hide Caller ID)
• S-CSCF Assignment Processes
• MEGACO and SIP-Controlled PSTN Connectivity
• Creation of via-path for Response Routing
• Response Merging
• Control Models
• Role and Functions of HSS
• Third-Party Call Control
• Conferencing (REFER)
• Access and Location Information
◦ P-Access
◦ P-Visited
• IMS Messaging (Immediate, Session-Based, Deferred)
Day 5
18. Security
• IPSEC
• Key Selection at Registration
• Security for Call Setup
• Authentication
• Securing the Media
• Privacy and Identity
19. Presence
Lab 3: Configure the SIPURA ATA