0% found this document useful (0 votes)
119 views

Course PDF

Study the IMS in a single weeklong class. Learn key IMS protocols including SIP, SDP, H.248, COPS, and Diameter. Examine how IMS weaves into the current telecommunications network.

Uploaded by

Rohit Sakpal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views

Course PDF

Study the IMS in a single weeklong class. Learn key IMS protocols including SIP, SDP, H.248, COPS, and Diameter. Examine how IMS weaves into the current telecommunications network.

Uploaded by

Rohit Sakpal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

 

The IP Multimedia Subsystem (IMS)

Thoroughly study the IMS in a single weeklong class. Course Code: 3255

In a single weeklong class, you will thoroughly study the IMS, including
relevant wireless access systems that are used by the IMS. You will begin by On-Site Learning
studying the systems surrounding the IMS to gain a clear vision of the big
picture. Once you understand where the IMS fits into the PSTN, you will study 5 Day Course
the IMS architecture through a process of lecture and hands-on training. You
will learn key IMS protocols including SIP, SDP, H.248, COPS, and Diameter. Partner-delivered Course
Learn what each IMS component is and how it functions in an actual test
network. The lessons in this course are clear, very technical, and always
practical. Since at least 40% of them are hands-on, you can investigate and
reinforce each lesson. In this course, you'll examine how IMS weaves into the
current telecommunications network-both wired and wireless.

Who Needs to Attend


What You'll Learn
Those who want a technical
• How IMS fits into the big picture explanation of the IMS
• IMS architecture architecture.
• IMS protocols SIP, Diameter, H.248, SDP, and COPs
• SIP Uniform Resource Indicators (URIs)
Prerequisites
• IMS-related IP services
• IMS call flow examples
• IMS security TCP/IP Networking
• Instant messaging and presence
Course Outline Voice over IP Foundations

Day 1 Follow-On Courses

1. The IMS Standards Bodies MEGACO (H.248) and the IMS

• 3GPP
• 3GPP2
• IETF
• Open Mobile Alliance (OMA)
• TISPAN

2. IMS for CDMA2000

• GSM vs. CDMA2000 3G architecture


• IMS Connectivity into a CDMA2000 Network
• Migrating CDMA2000 to Support the IMS using LTE Access
◦ Technical Innovations of LTE over 1xEVDO
◦ EVDO to LTE Migratio
◦ Mobility Management Element

3. IMS Architecture
• Components
◦ HSS
◦ Proxy-CSCF
◦ Serving CSCF
◦ Interrogating-CSCF
◦ Policy Decision Function
• SIP Protocol IntroductionIMS Identifiers
• IMS Message Paths Introduction (Via and Record-Route)
• The Service Path
• Initial Filter Criteria Introduction
• SDP Introduction

Day 2

4. IMS Reference Points

• Gm, Mw, Cx, Dx, Sh, Si, Dh, Mm, Mg, Mi, Mj, Mk, Ut, Mr, Mp, Go, Gq
• Specific Analysis of the Cx and Dx Interfaces
• DIAMETER

5. IMS Service Path

• The Service Path


• Path Header (RFC 3327)
• Service-Route (RFC 3608)

6. The Via Path

• The Via: Header


• Establishing the Response Path
• Forking - Response Merging
• Loops and Spirals
• Max Forwards

7. The Route Path

• Route Path vs. Via Path


• Record-Route and Route Headers
• Establishing the Route Path
• The Role of the S, I, and P Proxies

Day 3

8. IMS Identifies

• IMSI
• UICC
• Home Network, Public ID, Private ID
• SIP IRU Format

9. Initial Filter Criteria (iFC)

• The User Profile


• How the iFC is Used
• Understanding XML
• Disjunctive and Conjunctive Normal Form

10. SIP Headers (Basic)

• Via, Branch, Max-ForwardsSIP Dialog (To, From, tag=fields, Call-ID:)


• CSeq, Contact: Expires:
• Proxy-Authentication:, Proxy-Authorize:
• User-Agent:, Allow:, Supported:
• Content-Type:, Content-Length:

11. IMS SIP Headers (Advanced)

• P-Access-Network-Info
• P-Charging-Vector:, P-Preferred-Identity:, P-Asserted-Identity:,
Authorization:
• Security-Client:, Security-Server:
• IMS Signaling Compression (SigComp Architecture)

12. Session Description Protocol (SDP)

• Session Parameters
• SDP Format
• Extending SDP
• SDPng
• Media Negotiation
• Changing Session Parameters

13. SIP Timers

• T1, T2, T4
• Timers A-K

Day 4

14. IMS QoS Management

• IMS QoS Info Exchange During Call Setup


• New SDP Fields (RFC 3312)
• COPS Integration

15. IMS and the DNS

• DNS Basics
◦ A-Record
◦ The SRV Record (RFC2782)
◦ How SIP uses the SRV Record (RFC3263 Locating SIP Servers)
◦ How to Configure a SRV Record
◦ The NAPTR Record (RFC2915)
• How the P-CSCF Locates the I-CSCF
• Introduction to ENUM (RFC3761: ENUM Protocol)
• How the S-CSCF uses ENUM

16. IMS Call Flow Examples

• Registration
• Service Discovery
• Identity Modules
• IMS Authentication and Key Agreement (User Identities)
• Service TriggersInitial Filter Criteria
• Network Domain Security
• Secure HTTP-Based Service
• Controlling Bearer Traffic
• Controlling the Media
• Anonymous Calling (Hide Caller ID)
• S-CSCF Assignment Processes
• MEGACO and SIP-Controlled PSTN Connectivity
• Creation of via-path for Response Routing
• Response Merging
• Control Models
• Role and Functions of HSS
• Third-Party Call Control
• Conferencing (REFER)
• Access and Location Information
◦ P-Access
◦ P-Visited
• IMS Messaging (Immediate, Session-Based, Deferred)

17. Charging and IMS

• Charging Entities and Functions


• P-Headers Related to Charging
• Diameter and How It's Used for Ro Interface

Day 5

18. Security

• IPSEC
• Key Selection at Registration
• Security for Call Setup
• Authentication
• Securing the Media
• Privacy and Identity

19. Presence

• SIMPLE - SIP for Instant Messaging and Presence Leveraging Extensions


• Terminology
• Framework
• Resource List Manipulation Requirements
• Authorization Policy Manipulation
• Acceptance Policy Requirements
• Notification Requirements
• Content Requirements
• General Requirements

20. Organization of Subscriber Data

• Introduction for ETSI TS 123 008 UMTS - Organization of Subscriber


Data
• Definition
• Storage Facilities
• Subscriber Data in Functional Units other than the HLR, VLR, SGSN,
GGSN, GMLC, SMLC, and LMU
• Definition of Subscriber Data for CS and PS Domain
• Data Related to Subscription, Identification, and Numbering
• Data Related to Mobile Station Types
• Data Related to Authentication and Ciphering
• Data Related to Roaming
• Data Related to Basic Services
• Mobile Station Status Data
• Data Related to GPRS NAM
• Data Related to CAMEL
• Definition of Data for IP Multimedia Domain
• Data Related to Generic Authentication Architecture
• Definition of Subscriber Data I-WLAN Domain
• Summary of Data Stored in Location Registers
• Accessing Subscriber or PSI Data
Labs

Lab 1: Configure PCs and Build an IP Network

Lab 2: Learn How to Use Wireshark

 
Lab 3: Configure the SIPURA ATA

Lab 4: Configure the ONDO SIP Proxy

Lab 5: Configure OpenIMS

• Configure P-CSCF, I-CSCF, S-CSCF


• Configure HSS
• Configure DNS
• Configure iFC

Lab 6: Configure IMS Communicator Client

Lab 7: Perform IMS Call Traces using Open IMS

• IMS REGISTER with Authentication


• Normal IMS SIP Call
• 100rel (PRACK)
• Busy Call
• Vacant Number (call a number that does not exist)
• Abandoned Call (hang up on an unanswered call)
• DTMF - SIP INFO
• DTMF - RFC2833
• DTMF - in band
• Diameter Queries
• SIP NOTIFY and Subscribe
• Call Forward Immediate
• Call Forward No Answer
• Call Transfer (REFER)
• Bye Message with RTCP Call Information
• SIP Timers Effect on Call Processing
• SIP Calls on a Bad Wireless Network

Date created: 7/24/2010 7:36:07 AM


Copyright ©2010 Global Knowledge Training LLC  All rights reserved.  1-800-COURSES 

You might also like