Professional Documents
Culture Documents
Prepared By:-Satyender Kumar Reliance Jio
Prepared By:-Satyender Kumar Reliance Jio
Prepared By:-Satyender Kumar Reliance Jio
Satyender Kumar
Reliance Jio
Topics
• IMS architecture
4
IMS Architecture overview
IMS
5
What drives IMS Deployment?
There are both business and technical drivers associated with IMS deployment,
that will bring benefits in service creation capabilities as well as in cost
optimization
Increase
Revenue
Service
Enhancements
6
IMS and Service Enhancements: main keywords
From To
• Access agnostic
VoIP IM Mail VoD …
User
Integrated services platforms
• Services independent
DB
Services
IP
Control
• Open architecture Transport
• Multi-device
• Vendor independent
IMS enabled 7
A controlled path from separate infrastructures to all-IP
and IMS
• IMS architecture
9
IMS architecture
The 3rd Generation Partnership Project (3GPP) is a collaboration agreement that was established in
1998 bringing together a number of telecommunications standardization bodies. Scope of 3GPP was to
produce globally applicable Technical Specifications and Technical Reports for a 3rd Generation
Mobile Systems based on GSM, GPRS and EDGE core networks and the radio access technologies.
The European Telecommunications Standards Institute (ETSI) is an independent, non-profit organization, whose mission is
to produce telecommunications standards for today and for the future. responsible for standardization of Information and
Communication Technologies (ICT) within Europe
Alliance for Telecommunications Industry
European Telecommunications Solutions (ATIS) is a U.S.-based organization
Standards Institute is an independent, non- that is committed to rapidly developing and
profit organization, whose mission is to promoting technical and operations standards
produce telecommunications standards for for the communications
ICT within Europe ETSI
Japanese Telecommunication
Asian Association of Radio
ARIB ATIS Technology Committee, with the
purpose of contributing to
Industries and Businesses, to
conduct research & development
standardization in the field of
on utilization, realization and 3GPP telecommunications by
popularization of new radio
establishing protocols and
systems in telecommunications
standards
and broadcasting. CCSA TTC
TTA (Telecommunications Technology
China Communication Standards TTA Association) is an IT standards organization
Association, to contribute to the that develops new standards and provides
development of information industry one-stop services for the establishment of IT
standards as well as providing testing and
certification for IT products 11
IMS layers and functions : overview
The resulting IMS architecture defines
elements and functions on three layers:
MAP
Megaco
ISC SIP
OSA-SCS ISC IM-SSF
Si
Dh
SLF S-CSCF
Control Dx SIP
Layer Mw
Mg
SIP
Sh Cx Mi
HSS I-CSCF BGCF Mj MGCF
DIAMETER DIAMETER
Mw
SIP Mr Mn
SS7 -
MTP
SS7
INTERNET
IP Core
UTRAN PSTN/
Network GGSNGGSN MRFP MGW
PLMN
Fixed Network BRASBRAS
DSLAMDSLAM
© 2007 Accenture All Rights Reserved. 12
IMS Core Network Element : CSCF
The CSCF elements are responsible for SIP session control and implements the logics for the
following functions:
User authentication
Call routing
Controlling the generation of call detail records (CDRs) for accounting purposes
Each network will typically have multiple CSCFs of each type, allowing load sharing and
supporting increased reliability through the use of backup servers.
All the CSCF will use the session initiation protocol (SIP) as signaling protocol. Interaction with other
domains using different protocols are performed by dedicated elements which allow protocol translation.
IMS Core Network Element : P-CSCF
A P-CSCF is the first point of contact for the IMS terminal, and
performs the following main functionalities:
forwards the registration requests received from the UE to the I-CSCF
forwards the SIP messages to the S-CSCF that administrate the user, whose
address is defined during the registation
forwards the request and the answers to the UE
The P-CSCF is assigned to an IMS terminal during registration, assigned either via DHCP, or in
the PDP Context, and does not change for the duration of the registration.
Sits on the path of all signalling messages, and can inspect every message
Authenticates the user and establishes an IPsec security association with the IMS terminal. This prevents
spoofing attacks and replay attacks and protects the privacy of the user.
Can compress and decompress SIP messages using SigComp, which reduces the round-trip over slow radio links
May include a PDF (Policy Decision Function), which authorizes media plane resources e.g. quality of service
(QoS) over the media plane. It's used for policy control, bandwidth management, etc ... The PDF can also be a
separate function.
Can be located either in the visited network (in full IMS networks) or in the home network (when the visited network
is not IMS compliant yet).
Some networks might use a Session Border Controller for this function.
P-CSCF: An introduction.
The P-CSCF is the entry point to the IMS domain and serves as the outbound proxy server for the UE. The UE attaches to the P-CSCF prior to performing
IMS registrations and initiating SIP sessions. The P-CSCF may be in the home domain of the IMS operator, or it may be in the visiting domain, where the
UE is currently roaming. For attachment to a given P-CSCF, the UE performs the P-CSCF discovery procedures. Attachment to the P-CSCF is necessary
for the UE for initiating IMS registrations and sessions.
In these procedures, the UE first establishes the IP connectivity access network (IP-CAN) bearer. Then, the UE sends a query to the DHCP server for
retreiving the IP addresses and FQDN (Fully Qualified Domain Name) of the P-CSCF. After the DHCP query, the UE performs a DNS query on the FQDN
received from the DHCP server. In response to the DNS query, the IP address of the P-CSCF is returned. This is known as the DHCP-DNS procedure for
P-CSCF discovery. However, in some cases, it may be possible that the FQDN of the P-CSCF is pre-configured in the UE. In these scenarios, the UE can
directly query the DNS server and get the IP address of the P-CSCF.
DHCP:-
As we need a phone number to make a call to someone, we need an address to communicate with a network host over the
Internet. This address is called an "Internet Protocol (IP) address". Generally, IP addresses are dynamically allocated to clients
accessing the Internet, through Dynamic Host Configuration Protocol (DHCP), a protocol designed for dynamic allocation of IP
addresses, as defined in RFC 2131.
DHCP adopts the concept of a “lease” in IP allocation. This means, a DHCP server does not allocate an IP address to a client
permanently. What it does instead is set a “lease duration” and allow the client to use the allocated IP address only during the set
lease duration. If the client wishes to use the allocated IP address for longer than the lease duration, it should request the DHCP
server for renewal of the lease. If not, it performs an IP address release procedure instead.
Now, we will look at the IP address allocation procedure that describes how a DHCP client gets an IP address allocated by a DHCP
server.
A DHCP message used for the IP address allocation/lease consists of four message flows as shown in the following figure:
1) DHCP Discover
Message direction: DHCP Client -> DHCP Server
Broadcast message (Destination MAC = FF:FF:FF:FF:FF:FF)
What it is and what it does: This is a message sent by a DHCP client looking for a DHCP server. The client broadcasts this message
on the LAN (same subnet), actually saying “Any DHCP server available out there? Answer me if you hear me!”.
Key parameter:
o Client MAC: Client MAC address
2) DHCP Offer
Message direction: DHCP Server -> DHCP Client
Can be a broadcast-type or unicast-type message, depending on the Broadcast Flag value in the DHCP Discover message sent by
the DHCP client. The DHCP server sends a broadcast-type DHCP Offer message if the broadcast flag value is 1, but a unicast-type
message if it is 0.
What it is and what it does: This is the DHCP server's response to the DHCP client's call, saying “I can hear you!”. With this
message, the DHCP server not only announces the presence of itself, but also provides the DHCP client with all the network
configuration data including an IP address to be allocated to the DHCP client.
Key parameters:
o Client MAC: Client MAC address
o Your IP: IP address to be allocated/leased to the client
o Subnet Mask (option 1)
o Router (option 3): Client default gateway IP address
o DNS (option 6): DNS server IP address
o IP Lease Time (option 51): the time/period for which the client is permitted to use/lease the allocated IP address (Your IP)
o DHCP Server Identifier (option 54): the IP address of the DHCP server that sent this DHCP Offer message. Occasionally,
multiple DHCP servers may send the same DHCP Offer message, so each server includes its own IP address in this field
before sending the message to the client.
3) DHCP Request
Message direction: DHCP Client -> DHCP Server
Broadcast message (Destination MAC = FF:FF:FF:FF:FF:FF)
What it is and what it does: The client recognized the presence of DHCP server(s) and acquired the network configuration data
(client IP address, subnet mask, default gateway IP address, etc.) from the DHCP servers. Now, the client selects one of them and
then sends a DHCP Request message asking for the network configuration data to be used by the client.
Key parameters:
o Client MAC: Client MAC address
o Requested IP Address (option 50): An IP address that the client claimed saying "I will use this IP address." ("Your IP
address" in the DHCP Offer message is used in this field)
o DHCP Server Identifier (option 54): In case more than one DHCP server sends a DHCP Offer message, the client selects
one of the servers to access and has the IP address of the selected server entered in this field. In other words, the client
sends a DHCP Request message to the DHCP server of which ID address is defined in the DHCP Server Identifier field, and
then obtains the network configuration data, including an IP address, from the server.
4) DHCP Ack
Message direction: DHCP Server -> DHCP Client
Can be a broadcast-type message (Destination MAC = FF:FF:FF:FF:FF:FF) or unicast-type message, depending on the broadcast
flag value in the DHCP Discover message sent by the DHCP client. The DHCP server sends a broadcast-type DHCP Offer message if
the broadcast flag value is 1, but a unicast-type message if it is 0.
What it is and what it does: The last message sent in the DHCP procedure. With this message, the DHCP server delivers the
network configuration data to the DHCP client. This message includes the same network parameters contained in the network
configuration data of the DHCP Offer message discussed above.
Key parameters:
o Client MAC: Client MAC address
o Your IP: IP address to be allocated/leased to the client
o Subnet mask (option 1)
o Router (option 3): Client default gateway IP address
o DNS (option 6): DNS server IP address
o IP Lease Time (option 51): the time/period for which the client is permitted to use/lease the allocated IP address (Your IP)
o DHCP Server Identifier (option 54): the IP address of the DHCP server that sent this DHCP Ack message.
Now, the client, having exchanged all the messages including the last DHCP Ack, has obtained/leased the network configuration
data, including an IP address, and thus is ready to use the Internet.
13
its IP address is published in the DNS of the domain (using NAPTR and SRV type of DNS records),
so that remote servers can find it, and use it as a forwarding point (e.g. registering) for SIP packets to
this domain.
I-CSCF queries the HSS using the DIAMETER Cx interface to retrieve the user location (Dx
interface is used from I-CSCF to SLF to locate the needed HSS only), and then routes the SIP
request to its assigned S-CSCF.
Up to Release 6 it can also be used to hide the internal network from the outside world (encrypting
part of the SIP message), in which case it's called a THIG (Topology Hiding Inter-network Gateway).
From Release 7 onwards this "entry point" function is removed from the I-CSCF and is now part of the
IBCF (Interconnection Border Control Function). The IBCF is used as gateway to external
networks, and provides NAT and Firewall functions (pinholing).
15
IMS Core Network Element : S-CSCF
It is a SIP server always located in the home network. The S-CSCF uses
DIAMETER Cx and Dx interfaces to the HSS to download and upload
user profiles - it has no local storage of the user.
All necessary information is loaded from the HSS.
it handles SIP registrations, which allows it to bind the user location (e.g. the IP address of
the terminal) and the SIP address
it sits on the path of all signaling messages, and can inspect every message
it decides to which application server(s) the SIP message will be forwarded, in order to provide
their services
16
IMS Core Network Element : HSS or UPSF
The HSS also provides the traditional Home Location Register (HLR) and Authentication Centre (AUC)
functions. This allows the user to access the packet and circuit domains of the network initially, via
IMSI authentication.
User Profile is composed by:
user identity
allocated S-CSCF name
Registration information and roaming
profile authentication parameters
Control and service information.
© 2007 Accenture All Rights Reserved. 17
IMS Core Network Element : SLF
The SLF expose Dx and Dh interfaces, which have the same syntax and semantic of the Cx and
Sh interfaces provided by the HSS.
The SLF does not perform any logic on its interfaces, but replies to the requestor with a REDIRECT
message, specifying the address of the HSS which is able to fulfill the request received.
Both the HSS and the SLF communicate through the DIAMETER protocol.
18
IMS Core Network Element : MRF
It is exploited for :
– Playing of announcements (audio/video)
– Multimedia conferencing (e.g. mixing of audio streams)
– Text-to-speech conversion (TTS) and speech recognition.
– Realtime transcoding of multimedia data (i.e. conversion between different codecs)
– An MRFP (Media Resource Function Processor) is a media plane node that implements all
media-related functions.
If the breakout occurs in the same network as the BGCF then the BGCF selects a MGCF
(Media Gateway Control Function) that will be responsible for inter-working with the
PSTN, and forwards the signaling to MGCF. Otherwise it forwards signaling to BCGF of
another operator network
The MGCF then receives the SIP signalling from the BGCF and manages the interworking
with the PSTN network.
Application Servers
OSA
Third Party Compliant IN legacy SIP
Services Services
Services Services
CSE/
OSA AS\ OSA AS SIP AS
IN legacy
(OSA API) CAP Diameter
(OSA API) (Sh interface)
SIP
OSA (Si Interface) (ISC interface)
IM-SSF
Gateway
SIP SIP HSS
(ISC interfcae) (ISC Interface)
– ISC (between S-CSCF and OSA Gateway/IM-SSF/SIP AS) allows to receive/notify SIP messages from/to
the S-CSCF to realize the service session control
– Cx beetwen S-CSCF and HSS is used to retrieve/update the subscriber profile data
– Sh between HSS/OSA- Gateway/SIP-AS is used to retrieve/update the subscriber profile data related to
the service. The HSS is responsible for policing what information will be provided to each individual
application server.
– Si between HSS and IM-SSF is used to retrieve/update the subscriber profile data related to IN services
© 2007 Accenture All Rights Reserved. 24
Topics
• Introduction
25
Example: Registration and Basic Call Flow
Registration
UE 1 UE 2
I–CSCF
HSS
P–CSCF S–CSCF
I–CSCF
HSS
P–CSCF
UE 1 UE 2
IMS domain B
UE 3
© 2007 Accenture All Rights Reserved. 26
Example: Registration and Basic Call Flow
Session set up
UE in different IMS domain
UE 1 UE 2
The session origination procedures specify the
IMS S–CSCF S–CSCF signaling path between the UE initiating a
domain A
session setup attempt and the Serving-CSCF
that is assigned to perform the session
origination service. This signaling path is
determined at the time of UE registration, and
I–CSCF remains fixed for the life of the registration.
HSS
S–CSCF
P–CSCF
I–CSCF
HSS
P–CSCF
UE 1 UE 2
IMS domain B
UE 3
© 2007 Accenture All Rights Reserved. 27
Example: Registration and Basic Call Flow
Session set up
UE in the same IMS domain
UE 1 UE 2
The session origination procedures specify the
IMS S–CSCF S–CSCF signaling path between the UE initiating a
domain A
session setup attempt and the Serving-CSCF
that is assigned to perform the session
origination service. This signaling path is
determined at the time of UE registration, and
I–CSCF remains fixed for the life of the registration.
HSS
S–CSCF
P–CSCF
I–CSCF
HSS
P–CSCF
UE 1 UE 2
IMS domain B
UE 3
© 2007 Accenture All Rights Reserved. 28
Example: Call Flow with services :
Call Barring and Number Portability
User A initiates a call to a number that has been ported to an external network.
User A has the Call Barring service, which prevents him to call 1xx numbers, hence the S-CSCF triggers the
Application Server to apply the CB logic. The AS retrieves the profile associated to User A from the HSS,
perform the service logic, and sends back the message to the S-CSCF allowing the call.
• Introduction
• IMS architecture
30
Developing and deploying applications
• Applications deployed on ASs are the basic blocks used to develop services.
• Services can be provided directly by a single application or can be the result of the orchestration
of several applications, eventually hosted on different Application Servers.
• Application Servers are the execution environments for applications, providing framework facilities
such as protocols and interface support, database connections, security, monitoring and more…
Application Server
BSS i/f
NB i/f
BSS Presentation Interfaces
Charging
DB i/f
Applications
ServiceLogicsLaye
DB Connections
r
Performnance
Execution Environment
Libraries APIs
Assurance
Conn Pools
Data Layer
Configuration
OSS Data
Security
Connectors
S i/f
B
Protocols Listeners
Southbound systems
31
SLEE and Servlet-Container architectures
• Application Containers can be based on different paradigms, depending on the structure of the
application execution environment and on the technique used to convey messages between
different components inside the application server.
Two main execution environments types are currently exploited to develop application servers:
This kind of service environment has been SBB SBB SBB SBB
specifically thought for TelCo operators,
as allows following features:
Event Dispatcher
Modular development of service logics
Events Collector
Easy combination of different Service
Block to provide convergent services
Resource Adapters can be added or Resource Resource Resource
extended without modifying the service Adapter Adapter Adapter
logics implemented inside SBBs
External system
Servlet Containers are execution environments which bind the execution of a service logic to
the receiving of a particular request.
Service Logic lifecycle is entirely managed by the environment
Requests are associated to service logics depending on the type of message received (servlet
model) Service Logics are activated synchronously with request elaboration
Combination of service logics is managed redirecting messages inside the container
Servlet Container
The servlet paradigm can be used
implementing adaptors for several Service Service Service Service
protocols, allowing the development of fast
network oriented services:
Service Logics are directly connected Execution Execution Execution Execution
queue queue queue queue
to network messages
Can manage queuing, overloading
and prioritization of requests Protocol Protocol Protocol
Protocols and interfaces can be Listener Listener Listener
External system
• Introduction
• IMS architecture
The Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN) is a
standardization body of ETSI, specializing in fixed networks and Internet convergence.
TISPAN is the ETSI core competence centre for fixed networks and for migration from switched circuit
networks to packet-based networks with an architecture that can serve in both to create the Next Generation
Network.
•This focus on fixed accesses together with the choice of using the IMS network in the core architecture led
to new requirements and to an evolution of the original IMS solution.
TISPAN and 3GPP are now working together to define a harmonized IMS-centric core for both wireless
and wireline networks, enabling new convergent accesses and services.
3GPP /
TISPAN
IMS
Wireless access Wireline access
AGW
AGW
The NGN standard functional architecture, defined by TISPAN, is composed by a “service layer”
and a “transport-layer” both based on IP.
•This subsystem-oriented architecture enables the addition of new subsystems over the time to cover new
demands and service classes. The architecture ensures that the network resources, applications, and
user equipment are common to all subsystems and therefore ensure user, terminal and service mobility to
the fullest extent possible, including across administrative boundaries.
NASS makes possible to expose towards upper-layer systems users presence informations and at
the same time apply policies to control network access based on varoius users profiles
• Introduction
• IMS architecture
Operation
Strategy Development & Test Market Trial
Services Service Operation
Marketing & and Development Platforms E2E Roll Out Market Trial s
Service Network and Network Integration deployment
Requiremen Architecture Products Devp Deployment Tests Evolution
ts Design &
Customization
IMS is going to play a key role in Operators technology context for controlling and enabling
the introduction of innovative/convergent services in an ALL IP environment
IMS is emerging as the de facto convergence model for fixed, mobile and enterprise telephony.
IMS will be used to keep control of the network while using IP technologies: Service and Control
Layers will be implemented using IMS architectures as a key: element to support both IP
multimedia sessions over heterogeneous media type.
IMS architecture will be used as “the” mean for obtaining fixed and mobile convergence (3GPP-
TISPAN): different IMSs for mobile and fixed networks will be integrated and merged into a
single infrastructure (e.g. single HSS –Data Base for all users)
Innovative and advanced Services (e.g. combinational ones) will leverage convergent IMS-enabled
Service Layer
IMS alone is not enough, it will be complemented with additional functional elements such as:
external interfaces, databases, enablers (presence, location,…), QoS server, media server, IMS-
enabled terminals
Service interconnections with legacy and consolidated platforms in the short term
and with non-IMS platforms will be needed to deliver the integrated experience
that users ask for.
Service interconnection
Control
Transport
PSTN IP PLMN