SlideShare a Scribd company logo
1 of 14
Download to read offline
1
This slide shows the high-level sequence of events that take place prior to the IMS
registration
1. The UE attaches to the GPRS level
2. The UE establishes a PDP context. This may be a general PDP context or a dedicated
PDP context for IMS signalling. As a result, the UE gets an IPv6 /64 prefix. This allows
the UE to create an IPv6 address.
3. The UE performs the CSCF discovery procedure. As a result, the UE gets the IP
address of the P-CSCF allocated to the UE
4. The UE performs the IMS registration procedures
2
1. The UE sends a SIP REGISTER message. This message includes a Public User ID, the Private User ID, and
the home network SIP URI.
2. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards
the REGISTER request to that I-CSCF.
3. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user.
4. The HSS returns either:
• The address of the S-CSCF allocated to this user.
• A set of capabilities that will help the I-CSCF to choose an appropriate S-CSCF for this user.
5. The I-CSCF may choose a new S-CSCF or use an already allocated one. In both cases, it forwards the
REGISTER request to that S-CSCF.
6. The S-CSCF informs the HSS that this S-CSCF is taking care of the user.
7. The HSS returns one or more authentication vectors.
8. The S-CSCF challenges the UE.
9. The I-CSCF forwards the SIP response.
10. The P-CSCF forwards the SIP response to the UE.
3
The registration procedure continues:
11. The UE calculates the credentials, includes them into the REGISTER request, and
sends it to the P-CSCF.
12. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The
P-CSCF forwards the REGISTER request to that I-CSCF.
13. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this
user.
14. The HSS returns the address of the S-CSCF allocated to this user.
15. The I-CSCF forwards the REGISTER request to that S-CSCF.
16. The S-CSCF informs the HSS that this S-CSCF is taking care of the user.
17. The S-CSCF returns the user profile containing the filter criteria
18. The S-CSCF evaluates the filter criteria, and may contact, if needed, one ore more
application server. In this example, the filter criteria indicates that an application
server has to be informed about the user's registration. The S-CSCF creates a new
REGISTER (3rd party REGISTER)requests and sends to an application server.
19. The AS acknowledges the reception of the REGISTER request
20. The S-CSCF informs the UE about the successful registration.
21. The I-CSCF forwards the response.
22. The P-CSCF forwards the response
4
The Session Establishment procedures:
1. The UE sends an INVITE request through the originating leg (P-CSCF, optional I-CSCF
and S-CSCF). The INVITE request includes a Request-URI with the SIP URI of
destination subscriber.
2. The INVITE request contains a Route header that helps the P-CSCF to route the
INVITE request to the I-CSCF.
3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S-
CSCF.
4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A
does not have any originating services, so no AS is contacted. Then the S-CSCF
inspects the Request-URI to find the destination network. With the help of DNS, the
S-CSCF finds the entry point (I-CSCF) of Home B. The S-CSCF forwards the INVITE
request to that I-CSCF.
5. The I-CSCF queries the HSS to find out which S-CSCF is serving the destination
subscriber B.
6. The HSS returns the address of the S-CSCF serving subscriber B
7. The I-CSCF forwards the INVITE request to that S-CSCF
8. The S-CSCF evaluates the service criteria for subscriber B. In this example, there are
no AS involved. The S-CSCF, inspecting the Contact information (at registration),
forwards the INVITE request to the P-CSCF.
9. The P-CSCF forwards the INVITE request to the UA
10-16. UE B accepts the session. The 200 (OK) response is forwarded backwards to UE A.
5
Session initiation involving PSTN interworking:
1. The UE sends an INVITE request. The Request-URI (destination) contains a TEL URL.
2. The INVITE request contains a Route header that helps the P-CSCF to route the
INVITE request to the I-CSCF.
3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S-
CSCF.
4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A
does not have any originating services, so no AS is contacted. Then the S-CSCF
inspects the Request-URI to find the destination network. As the Request-URI
contains a TEL URL, the S-CSCF queries DNS to translate the TEL URL into a SIP URI.
5. The DNS returns a "no match" for this TEL URL.
6. The S-CSCF, as it has no options, routes the call to the BGCF in the home network.
7. The BGCF in the home network selects a suitable gateway operator (another BGCF)
8. The BGCF selects an appropriate MGCF.
9. The MGCF reserves resources (TDM slot, DSP processors, etc.) in the Media
Gateway.
10. The MG confirms the successful reservation of resources.
11. The MGCF initiates BICC/ISUP signalling towards the PSTN.
12. Eventually, the subscriber in the PSTN answers the call.
12-16 The call is completed.
6
This slide shows an example of a roaming subscriber initiating a session. Only the
originating leg of the session is shown. Note that there is not I-CSCF or HSS involved.
7
8
This slide shows an example of a roaming subscriber terminating a session. Only the
terminating leg of the session is shown. Note that there is not I-CSCF involved.
9
10
The service profile defines the service handling for a user at the S-CSCF. The profile itself
is a structured data format with the following information elements:
•Application address: The SIP URI the S-CSCF uses to address the application
•Filter criteria: This element specifies the conditions for the invocation of the
application. The condition is formulated as a filter rule, which can be applied to a SIP
request (e.g. request method, presence or absence of header, header contents, etc.).
The filter “language” allows formulating nearly arbitrary complex invocation rules.
•Application priority: The priority of an application determines the sequence of
application execution in case the invocation conditions of multiple applications match a
single SIP request received by the S-CSCF.
11
This slides shows an example of an application server involvement.
The service running in Application Server 33 is designed so that sessions received during business hours
from the user's mother are diverted to an automatic answering machine, but calls received outside
business hours proceed as usual.
The service running is Application Server 38 is a Call Forwarding Unconditional, but in this example, as the
answering machine service has priority, it is not triggered.
Note that AS 33 is acting as a User Agent (UA) for this particular instance of the service.
1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user,
sip:user1@home1.net
2. At registration time, the S-CSCF downloaded the user profile containing the Filter Criteria.
• The S-CSCF evaluates the user's Filter Criteria against the received INVITE request.
• The Filter Criteria indicates that:
• INVITE request
• Address to sip:user1@home1.net
• Where the originating subscriber is sip:users_mom@home1.net
• ACTION: forward the INVITE to the Application Server 33
• Therefore, the S-CSCF forwards the INVITE request to AS33.
3. AS33 evaluates the current time: It is 11:00. The logic of the service says that between 9 and 17 all
session attempts from the user's mother are diverted to an answering machine. The AS acts as a SIP
User Agent and returns a 200 OK response.
4. The 200 OK response is forwarded to the user's mother
The AS 33 plays some personalized welcome message and starts the recording of the message.
12
This slides shows an example of an application server involvement.
The service running in Application Server 33 is designed so that sessions received during business hours
from the user's mother are diverted to an automatic answering machine, but calls received outside
business hours proceed as usual.
The service running is Application Server 38 is a Call Forwarding Unconditional.
Note that AS 33 is acting as a proxy server for this particular instance of service.
1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user,
sip:user1@home1.net
2. The S-CSCF evaluates the user's Filter Criteria against the received INVITE request.
• The Filter Criteria indicates that:
• INVITE request
• Address to sip:user1@home1.net
• Where the originating subscriber is sip:users_mom@home1.net
• ACTION: forward the INVITE to the Application Server 33
• Therefore, the S-CSCF forwards the INVITE request to AS33.
3. AS33 evaluates the current time: It is 19:00. The logic of the service says that between 9 and 17 all
session attempts from the user's mother are diverted to an answering machine. Otherwise, the AS is
not interested in the signalling. The AS acts as a SIP proxy and forwards the INVITE request again to
the S-CSCF.
4. The S-CSCF continues the Filter Criteria evaluation. As a result of it, it forwards the INVITE to another
AS, AS 38.
5. AS 38 is a Call Forwarding AS. It re-writes the Request-URI (destination) to another location
(sip:user44@home33.net) where the user may be contacted. Acting as a SIP proxy, the AS 38
forwards the INVITE back to the S-CSCF
6. The S-CSCF finished the evaluation of the Filter Criteria. It routes the INVITE request based on the
destination (Request-URI). It forwards the INVITE to an entry point in home33.net network.
13
14

More Related Content

What's hot

volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismKent Loh
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session FlowKent Loh
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedAmit Deshmukh
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained Vikas Shokeen
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architectureVikas Shokeen
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...Vikas Shokeen
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIPLaraib Khan
 
Lessons Learned: Implementing VoLTE Roaming
Lessons Learned: Implementing VoLTE Roaming Lessons Learned: Implementing VoLTE Roaming
Lessons Learned: Implementing VoLTE Roaming Syniverse
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenakerenumplatform
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 

What's hot (20)

volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS Mechanism
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIP
 
Lessons Learned: Implementing VoLTE Roaming
Lessons Learned: Implementing VoLTE Roaming Lessons Learned: Implementing VoLTE Roaming
Lessons Learned: Implementing VoLTE Roaming
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 

Viewers also liked

General Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERGeneral Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERmohsen hussain
 
Реклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюРеклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюJulia Byelikova
 
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranTwo Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranCara Curran
 
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)mia maya aziza
 
Pembekalan kkn 2016
Pembekalan kkn 2016Pembekalan kkn 2016
Pembekalan kkn 2016cicit123
 
10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to AnalyticsXtage Labs
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysDepartment of Sport and Recreation
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiYusuf Saktian
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Feni Prasetiya
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahYusuf Saktian
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanIndependent
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimIsabelle Girard
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenFeni Prasetiya
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTERobert Seymour
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 

Viewers also liked (19)

Fahad surahio
Fahad surahioFahad surahio
Fahad surahio
 
cv2
cv2cv2
cv2
 
General Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERGeneral Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTER
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 
Реклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюРеклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістю
 
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranTwo Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
 
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
 
Pembekalan kkn 2016
Pembekalan kkn 2016Pembekalan kkn 2016
Pembekalan kkn 2016
 
10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to Analytics
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathways
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - Halusinasi
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri Rendah
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia Pendidikan
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantren
 
Harga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.comHarga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.com
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTE
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 

Similar to IMS Call Follow

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfFabianLopez488132
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opernakruthi k
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detailGeorge Vlismas
 
HelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadHelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadDavid Riccitelli
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
COMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSCOMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSSaji banu
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure callsimnomus
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overviewFaisal Khan
 
Applying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadApplying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadYang Hong
 

Similar to IMS Call Follow (20)

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdf
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
 
Rpc
RpcRpc
Rpc
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
Ims in ngn
Ims in ngnIms in ngn
Ims in ngn
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detail
 
Sip
SipSip
Sip
 
HelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadHelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed Load
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
SCE 2
SCE 2SCE 2
SCE 2
 
COMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSCOMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMS
 
What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
Lecture9
Lecture9Lecture9
Lecture9
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure calls
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
 
IMS Signaling Details
IMS Signaling DetailsIMS Signaling Details
IMS Signaling Details
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
Applying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadApplying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP Overload
 

More from Houman Sadeghi Kaji

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Houman Sadeghi Kaji
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Houman Sadeghi Kaji
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementHouman Sadeghi Kaji
 

More from Houman Sadeghi Kaji (8)

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud Management
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
Ims naming identity
Ims naming identityIms naming identity
Ims naming identity
 
What is ims
What is imsWhat is ims
What is ims
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

IMS Call Follow

  • 1. 1
  • 2. This slide shows the high-level sequence of events that take place prior to the IMS registration 1. The UE attaches to the GPRS level 2. The UE establishes a PDP context. This may be a general PDP context or a dedicated PDP context for IMS signalling. As a result, the UE gets an IPv6 /64 prefix. This allows the UE to create an IPv6 address. 3. The UE performs the CSCF discovery procedure. As a result, the UE gets the IP address of the P-CSCF allocated to the UE 4. The UE performs the IMS registration procedures 2
  • 3. 1. The UE sends a SIP REGISTER message. This message includes a Public User ID, the Private User ID, and the home network SIP URI. 2. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards the REGISTER request to that I-CSCF. 3. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user. 4. The HSS returns either: • The address of the S-CSCF allocated to this user. • A set of capabilities that will help the I-CSCF to choose an appropriate S-CSCF for this user. 5. The I-CSCF may choose a new S-CSCF or use an already allocated one. In both cases, it forwards the REGISTER request to that S-CSCF. 6. The S-CSCF informs the HSS that this S-CSCF is taking care of the user. 7. The HSS returns one or more authentication vectors. 8. The S-CSCF challenges the UE. 9. The I-CSCF forwards the SIP response. 10. The P-CSCF forwards the SIP response to the UE. 3
  • 4. The registration procedure continues: 11. The UE calculates the credentials, includes them into the REGISTER request, and sends it to the P-CSCF. 12. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards the REGISTER request to that I-CSCF. 13. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user. 14. The HSS returns the address of the S-CSCF allocated to this user. 15. The I-CSCF forwards the REGISTER request to that S-CSCF. 16. The S-CSCF informs the HSS that this S-CSCF is taking care of the user. 17. The S-CSCF returns the user profile containing the filter criteria 18. The S-CSCF evaluates the filter criteria, and may contact, if needed, one ore more application server. In this example, the filter criteria indicates that an application server has to be informed about the user's registration. The S-CSCF creates a new REGISTER (3rd party REGISTER)requests and sends to an application server. 19. The AS acknowledges the reception of the REGISTER request 20. The S-CSCF informs the UE about the successful registration. 21. The I-CSCF forwards the response. 22. The P-CSCF forwards the response 4
  • 5. The Session Establishment procedures: 1. The UE sends an INVITE request through the originating leg (P-CSCF, optional I-CSCF and S-CSCF). The INVITE request includes a Request-URI with the SIP URI of destination subscriber. 2. The INVITE request contains a Route header that helps the P-CSCF to route the INVITE request to the I-CSCF. 3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S- CSCF. 4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A does not have any originating services, so no AS is contacted. Then the S-CSCF inspects the Request-URI to find the destination network. With the help of DNS, the S-CSCF finds the entry point (I-CSCF) of Home B. The S-CSCF forwards the INVITE request to that I-CSCF. 5. The I-CSCF queries the HSS to find out which S-CSCF is serving the destination subscriber B. 6. The HSS returns the address of the S-CSCF serving subscriber B 7. The I-CSCF forwards the INVITE request to that S-CSCF 8. The S-CSCF evaluates the service criteria for subscriber B. In this example, there are no AS involved. The S-CSCF, inspecting the Contact information (at registration), forwards the INVITE request to the P-CSCF. 9. The P-CSCF forwards the INVITE request to the UA 10-16. UE B accepts the session. The 200 (OK) response is forwarded backwards to UE A. 5
  • 6. Session initiation involving PSTN interworking: 1. The UE sends an INVITE request. The Request-URI (destination) contains a TEL URL. 2. The INVITE request contains a Route header that helps the P-CSCF to route the INVITE request to the I-CSCF. 3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S- CSCF. 4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A does not have any originating services, so no AS is contacted. Then the S-CSCF inspects the Request-URI to find the destination network. As the Request-URI contains a TEL URL, the S-CSCF queries DNS to translate the TEL URL into a SIP URI. 5. The DNS returns a "no match" for this TEL URL. 6. The S-CSCF, as it has no options, routes the call to the BGCF in the home network. 7. The BGCF in the home network selects a suitable gateway operator (another BGCF) 8. The BGCF selects an appropriate MGCF. 9. The MGCF reserves resources (TDM slot, DSP processors, etc.) in the Media Gateway. 10. The MG confirms the successful reservation of resources. 11. The MGCF initiates BICC/ISUP signalling towards the PSTN. 12. Eventually, the subscriber in the PSTN answers the call. 12-16 The call is completed. 6
  • 7. This slide shows an example of a roaming subscriber initiating a session. Only the originating leg of the session is shown. Note that there is not I-CSCF or HSS involved. 7
  • 8. 8
  • 9. This slide shows an example of a roaming subscriber terminating a session. Only the terminating leg of the session is shown. Note that there is not I-CSCF involved. 9
  • 10. 10
  • 11. The service profile defines the service handling for a user at the S-CSCF. The profile itself is a structured data format with the following information elements: •Application address: The SIP URI the S-CSCF uses to address the application •Filter criteria: This element specifies the conditions for the invocation of the application. The condition is formulated as a filter rule, which can be applied to a SIP request (e.g. request method, presence or absence of header, header contents, etc.). The filter “language” allows formulating nearly arbitrary complex invocation rules. •Application priority: The priority of an application determines the sequence of application execution in case the invocation conditions of multiple applications match a single SIP request received by the S-CSCF. 11
  • 12. This slides shows an example of an application server involvement. The service running in Application Server 33 is designed so that sessions received during business hours from the user's mother are diverted to an automatic answering machine, but calls received outside business hours proceed as usual. The service running is Application Server 38 is a Call Forwarding Unconditional, but in this example, as the answering machine service has priority, it is not triggered. Note that AS 33 is acting as a User Agent (UA) for this particular instance of the service. 1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user, sip:user1@home1.net 2. At registration time, the S-CSCF downloaded the user profile containing the Filter Criteria. • The S-CSCF evaluates the user's Filter Criteria against the received INVITE request. • The Filter Criteria indicates that: • INVITE request • Address to sip:user1@home1.net • Where the originating subscriber is sip:users_mom@home1.net • ACTION: forward the INVITE to the Application Server 33 • Therefore, the S-CSCF forwards the INVITE request to AS33. 3. AS33 evaluates the current time: It is 11:00. The logic of the service says that between 9 and 17 all session attempts from the user's mother are diverted to an answering machine. The AS acts as a SIP User Agent and returns a 200 OK response. 4. The 200 OK response is forwarded to the user's mother The AS 33 plays some personalized welcome message and starts the recording of the message. 12
  • 13. This slides shows an example of an application server involvement. The service running in Application Server 33 is designed so that sessions received during business hours from the user's mother are diverted to an automatic answering machine, but calls received outside business hours proceed as usual. The service running is Application Server 38 is a Call Forwarding Unconditional. Note that AS 33 is acting as a proxy server for this particular instance of service. 1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user, sip:user1@home1.net 2. The S-CSCF evaluates the user's Filter Criteria against the received INVITE request. • The Filter Criteria indicates that: • INVITE request • Address to sip:user1@home1.net • Where the originating subscriber is sip:users_mom@home1.net • ACTION: forward the INVITE to the Application Server 33 • Therefore, the S-CSCF forwards the INVITE request to AS33. 3. AS33 evaluates the current time: It is 19:00. The logic of the service says that between 9 and 17 all session attempts from the user's mother are diverted to an answering machine. Otherwise, the AS is not interested in the signalling. The AS acts as a SIP proxy and forwards the INVITE request again to the S-CSCF. 4. The S-CSCF continues the Filter Criteria evaluation. As a result of it, it forwards the INVITE to another AS, AS 38. 5. AS 38 is a Call Forwarding AS. It re-writes the Request-URI (destination) to another location (sip:user44@home33.net) where the user may be contacted. Acting as a SIP proxy, the AS 38 forwards the INVITE back to the S-CSCF 6. The S-CSCF finished the evaluation of the Filter Criteria. It routes the INVITE request based on the destination (Request-URI). It forwards the INVITE to an entry point in home33.net network. 13
  • 14. 14