SlideShare a Scribd company logo
1 of 9
IMS Registration
Flow
IP Multimedia Subsystem Series
P-CSCF Discovery
1. The UE requests a DHCP server and additionally
requests the domain name and/or IP address of the
P-CSCF and IP addresses of DNS servers;
2. The UE performs a DNS query to retrieve a list of
P-CSCF(s) IP addresses from which one is selected;
3. After reception of domain name and IP address of a
P-CSCF the UE may initiate communication towards
the IM subsystem.
DHCP Server
UE
DNS Server
P-CSCF
1
2
3
Session
Control
Transport
Access
Registration Flow (Without Authentication)
P-CSCF
I-CSCF
HSS
UE
S-CSCF
AS
• When a UE attaches to IMS, a S-CSCF shall be
assigned to serve the UE;
• The assignment of an S-CSCF is performed in the
I-CSCF;
• The Serving-CSCF is able to retrieve a service profile
of the user who has IMS subscription from HSS.
• The S-CSCF shall check the registration request
against the filter information and if necessary inform
Application Servers about the registration of the user;
(1) Register
(2) Register
(10) 200 OK 5 Register
(11) 200 OK
(12) 200 OK
3
4
6 7
(8) Register
(9) 200 OK
Visited
Network
Home
Network
Re-Registration Flow (Without Authentication)
P-CSCF
I-CSCF
HSS
UE
S-CSCF
AS
• Periodic application level re-registration is initiated by
the UE either to refresh an existing registration or in
response to a change in the registration status of the
UE;
• When initiated by the UE, based on the registration
time established during the previous registration, the
UE shall keep a timer shorter than the registration
related timer in the network;
• . Re-registration follows the same process as defined
before.(1) Register
(2) Register
(10) 200 OK 5 Register
(11) 200 OK
(12) 200 OK
3
4
6 7
(8) Register
(9) 200 OK
Visited
Network
Home
Network
De-Registration Flow (UE Initiated)
P-CSCF
I-CSCF
HSS
UE
S-CSCF
AS
• When the UE wants to de-register from the IMS then
the UE shall perform application level de-registration.
De-registration is accomplished by a registration with
an expiration time of zero seconds. De-registration
follows the same path as defined
• Re-registration follows the same process as defined
before.
(1) Register
(2) Register
(10) 200 OK 5 Register
(11) 200 OK
(12) 200 OK
3
4
6 7
(8) Register
(9) 200 OK
Visited
Network
Home
Network
De-Registration Flow (Registration Timeout)
P-CSCF
HSS
UE
S-CSCF
AS
• The diagram flow shows a network initiated IM CN
subsystem terminal application (SIP) de-registration
based on a registration timeout;
• A timer value is provided at initial registration and is
refreshed by subsequent re-registrations. The flow
assumes that the timer has expired;
• De-registration is accomplished by a registration with
an expiration time of zero seconds.
(1)Timer Expires
(1)Timer Expires
3 4
Visited
Network
Home
Network
(2) Register
(2) 200 OK
De-Registration Flow (Administrative)
P-CSCF
HSS
UE
S-CSCF
AS
• For different reasons (e.g., subscription termination,
lost terminal, etc.) a home network administrative
function may determine a need to clear a user's SIP
registration;
• De-registration is accomplished by a registration with
an expiration time of zero seconds.
(6) 200 OK
(5) 200 OK
(3) Register
(4) Register
1
(2) Register
(2) 200 OK
Visited
Network
Home
Network
7
Registration Flow (With Authentication)
P-CSCF
I-CSCF
HSS
UE
S-CSCF
(1) Register
(2) Register
(8) 401 5 Register
(9) 401
(10) 401
3
4
6 7
Visited
Network
Home
Network
P-CSCF
I-CSCF
HSS
UE
S-CSCF
AS
(1) Register
(2) Register
(10) 200 OK 5 Register
(11) 200 OK
(12) 200 OK
3
4
6 7
(8) Register
(9) 200 OK
thank you

More Related Content

What's hot

IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core ElementsKent Loh
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismKent Loh
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session FlowKent Loh
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
Ims call flow
Ims call flowIms call flow
Ims call flowMorg
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and HandoverSitha Sok
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedAmit Deshmukh
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 

What's hot (20)

IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS Mechanism
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
Ims call flow
Ims call flowIms call flow
Ims call flow
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and Handover
 
Lte signaling
Lte signalingLte signaling
Lte signaling
 
5gc call flow
5gc call flow5gc call flow
5gc call flow
 
2 g data call flow
2 g data call flow2 g data call flow
2 g data call flow
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 

Similar to IMS Registration Flow

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfFabianLopez488132
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detailGeorge Vlismas
 
IMS Core Introduction for CS Specialist
IMS Core Introduction for CS SpecialistIMS Core Introduction for CS Specialist
IMS Core Introduction for CS SpecialistAdrián Lopez
 
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbCN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbPRADEEPERUKULLA2
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 mohammad norozzudegan
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overviewFaisal Khan
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjPRADEEPERUKULLA2
 
C22 20090615-030 via csfb support
C22 20090615-030 via csfb supportC22 20090615-030 via csfb support
C22 20090615-030 via csfb supportkarthick2007
 
z/OS Communications Server Technical Update
z/OS Communications Server Technical Updatez/OS Communications Server Technical Update
z/OS Communications Server Technical UpdatezOSCommserver
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 
Subscriber provisioning BWIF conference presentation
Subscriber provisioning   BWIF conference presentationSubscriber provisioning   BWIF conference presentation
Subscriber provisioning BWIF conference presentationSanjay Dhar
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 

Similar to IMS Registration Flow (20)

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdf
 
IMS Call Follow
IMS Call FollowIMS Call Follow
IMS Call Follow
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
IMS Signaling Details
IMS Signaling DetailsIMS Signaling Details
IMS Signaling Details
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detail
 
IMS Core Introduction for CS Specialist
IMS Core Introduction for CS SpecialistIMS Core Introduction for CS Specialist
IMS Core Introduction for CS Specialist
 
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbCN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2
 
SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
 
C22 20090615-030 via csfb support
C22 20090615-030 via csfb supportC22 20090615-030 via csfb support
C22 20090615-030 via csfb support
 
z/OS Communications Server Technical Update
z/OS Communications Server Technical Updatez/OS Communications Server Technical Update
z/OS Communications Server Technical Update
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Ims in ngn
Ims in ngnIms in ngn
Ims in ngn
 
Subscriber provisioning BWIF conference presentation
Subscriber provisioning   BWIF conference presentationSubscriber provisioning   BWIF conference presentation
Subscriber provisioning BWIF conference presentation
 
voip_wireless_wipro.ppt
voip_wireless_wipro.pptvoip_wireless_wipro.ppt
voip_wireless_wipro.ppt
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
VMware EMC Service Talk
VMware EMC Service TalkVMware EMC Service Talk
VMware EMC Service Talk
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

IMS Registration Flow

  • 2. P-CSCF Discovery 1. The UE requests a DHCP server and additionally requests the domain name and/or IP address of the P-CSCF and IP addresses of DNS servers; 2. The UE performs a DNS query to retrieve a list of P-CSCF(s) IP addresses from which one is selected; 3. After reception of domain name and IP address of a P-CSCF the UE may initiate communication towards the IM subsystem. DHCP Server UE DNS Server P-CSCF 1 2 3 Session Control Transport Access
  • 3. Registration Flow (Without Authentication) P-CSCF I-CSCF HSS UE S-CSCF AS • When a UE attaches to IMS, a S-CSCF shall be assigned to serve the UE; • The assignment of an S-CSCF is performed in the I-CSCF; • The Serving-CSCF is able to retrieve a service profile of the user who has IMS subscription from HSS. • The S-CSCF shall check the registration request against the filter information and if necessary inform Application Servers about the registration of the user; (1) Register (2) Register (10) 200 OK 5 Register (11) 200 OK (12) 200 OK 3 4 6 7 (8) Register (9) 200 OK Visited Network Home Network
  • 4. Re-Registration Flow (Without Authentication) P-CSCF I-CSCF HSS UE S-CSCF AS • Periodic application level re-registration is initiated by the UE either to refresh an existing registration or in response to a change in the registration status of the UE; • When initiated by the UE, based on the registration time established during the previous registration, the UE shall keep a timer shorter than the registration related timer in the network; • . Re-registration follows the same process as defined before.(1) Register (2) Register (10) 200 OK 5 Register (11) 200 OK (12) 200 OK 3 4 6 7 (8) Register (9) 200 OK Visited Network Home Network
  • 5. De-Registration Flow (UE Initiated) P-CSCF I-CSCF HSS UE S-CSCF AS • When the UE wants to de-register from the IMS then the UE shall perform application level de-registration. De-registration is accomplished by a registration with an expiration time of zero seconds. De-registration follows the same path as defined • Re-registration follows the same process as defined before. (1) Register (2) Register (10) 200 OK 5 Register (11) 200 OK (12) 200 OK 3 4 6 7 (8) Register (9) 200 OK Visited Network Home Network
  • 6. De-Registration Flow (Registration Timeout) P-CSCF HSS UE S-CSCF AS • The diagram flow shows a network initiated IM CN subsystem terminal application (SIP) de-registration based on a registration timeout; • A timer value is provided at initial registration and is refreshed by subsequent re-registrations. The flow assumes that the timer has expired; • De-registration is accomplished by a registration with an expiration time of zero seconds. (1)Timer Expires (1)Timer Expires 3 4 Visited Network Home Network (2) Register (2) 200 OK
  • 7. De-Registration Flow (Administrative) P-CSCF HSS UE S-CSCF AS • For different reasons (e.g., subscription termination, lost terminal, etc.) a home network administrative function may determine a need to clear a user's SIP registration; • De-registration is accomplished by a registration with an expiration time of zero seconds. (6) 200 OK (5) 200 OK (3) Register (4) Register 1 (2) Register (2) 200 OK Visited Network Home Network 7
  • 8. Registration Flow (With Authentication) P-CSCF I-CSCF HSS UE S-CSCF (1) Register (2) Register (8) 401 5 Register (9) 401 (10) 401 3 4 6 7 Visited Network Home Network P-CSCF I-CSCF HSS UE S-CSCF AS (1) Register (2) Register (10) 200 OK 5 Register (11) 200 OK (12) 200 OK 3 4 6 7 (8) Register (9) 200 OK

Editor's Notes

  1. Before the UE can request IM services, an appropriate IP‑CAN bearer must be available to carry IM Subsystem related signalling. the P‑CSCF discovery may be performed during or after the IP connectivity has been established. In the case where UE is aware of more than one P‑CSCF address, the selection shall be based on home operator configured policy to select the P‑CSCF. The DHCP relay agent may exist within the IP-Connectivity Access Network relays DHCP messages between UE and the DHCP server. This is not illustrated in the above diagram.
  2. Procedures: After the UE has obtained IP connectivity, it can perform the IM registration. To do so, the UE sends the Register information flow to the proxy; Upon receipt of the register information flow, the P‑CSCF shall examine the "home domain name" to discover the entry point to the home network (i.e. the I‑CSCF). The proxy shall send the Register information flow to the I‑CSCF; The I‑CSCF shall send the Cx-Query/Cx-Select-Pull information flow to the HSS; Cx-Query Resp/Cx-Select-Pull Resp is sent from the HSS to the I‑CSCF. It shall contain the S‑CSCF name, if it is known by the HSS, or the S‑CSCF capabilities, if it is necessary to select a new S‑CSCF. When capabilities are returned, the I‑CSCF shall construct a name from the capabilities returned; I‑CSCF shall then send the register information flow to the selected S‑CSCF; The S‑CSCF shall send Cx-Put/Cx-Pull to the HSS; The HSS shall store the S‑CSCF name for that user and return the information flow Cx-Put Resp/Cx-Pull Resp (user information) to the S‑CSCF; Based on the filter criteria, the S‑CSCF shall send register information to the service control platform and perform whatever service control procedures are appropriate. The AS shall return the 200 OK information flow to the S‑CSCF if the 3rd Party registration is successful; The S‑CSCF shall return the 200 OK information flow to the I‑CSCF; The I‑CSCF shall send information flow 200 OK to the P‑CSCF. Note: The I‑CSCF shall release all registration information after sending information flow 200 OK; The P‑CSCF shall store the home network contact information, and shall send information flow 200 OK to the UE. Note: 1, 2, 5 and 8 are SIP Register message; 3, 4, 6, and 7 are Diameter query and response message; 9, 10, 11 and 12 are SIP 200 OK message; These flows do not take into account security features such as user authentication. The description of the impact of IMS security features is done in TS 33.203.
  3. The UE initiates a re-registration. For periodic registration, the UE initiates a re-registration prior to expiry of the agreed registration timer. When the UE wants to de-register from the IMS then the UE shall perform application level de-registration. De-registration is accomplished by a registration with an expiration time of zero s econds. De-registration follows the same path as defined.
  4. If an ungraceful session termination occurs (e.g. flat battery or mobile leaves coverage), when a stateful proxy server (such as the S‑CSCF) is involved in a session, memory leaks and eventually server failure can occur due to hanging state machines. To ensure stable S‑CSCF operation and carrier grade service, a mechanism to handle the ungraceful session termination issue is required. This mechanism should be at the SIP protocol level in order to guarantee access independence for the IM CN subsystem. Procedures The registration timers in the P‑CSCF and in the S‑CSCF expire. The timers are assumed to be close enough that no external synchronisation is required. The P‑CSCF updates its internal databases to remove the Public User Identity from being registered. Based on the filter criteria, the S‑CSCF shall send de-registration information to the service control platform and perform whatever service control procedures are appropriate. Service control platform removes all subscription information related to this specific Public User Identity. S‑CSCF can send Cx-Put to HSS and the HSS then can clear S‑CSCF name for that IMPU according to Cx-Put the request. The HSS shall send Cx-Put Resp to the S‑CSCF to acknowledge the sending of Cx-Put. The IM CN subsystem can initiate a Network Initiated De-Registration procedures for the following reasons: Network Maintenance Forced re-registrations from users, e.g. in case of data inconsistency at node failure etc; Network/traffic determined The IM CN subsystem must support a mechanism to avoid duplicate registrations or inconsistent information storage. This case will occur when a user roams to a different network without de-registering the previous one. Application Layer determined The service capability offered by the IM CN Subsystem to the Application Layers may have parameters specifying whether all IM CN subsystem registrations are to be removed, or only those from one or a group of terminals from the user, etc. Subscription Management The operator must be able to restrict user access to the IM CN subsystem upon detection of contract expiration, removal of IM subscription, fraud detection, etc.
  5. Procedure: HSS initiates the de-registration, sending a Cx-Deregister (user identity) which may include the reason for the de-registration; Based on the filter criteria, the S‑CSCF shall send de-registration information to the service control platform and perform whatever service control procedures are appropriate; The S‑CSCF issues a de-registration towards the P‑CSCF for this user and updates its internal database to remove the user from being registered. The reason for the de-registration received from the HSS shall be included if available. The P‑CSCF informs the UE of the de-registration and without modification forwards the reason for the de-registration, if available. Due to loss of contact with the mobile, it might be possible that the UE does not receive the information of the de-registration; The P‑CSCF sends a response to the S‑CSCF and updates its internal database to remove the user from being registered. If the P‑CSCF has an active subscription to notifications of the status of the IMS Signalling connectivity, the P‑CSCF shall cancel the subscription (see TS 23.203 [54] for more details); When possible, the UE sends a response to the P‑CSCF to acknowledge the de-registration. A misbehaving UE or a UE that is out of P‑CSCF coverage could not answer properly to the de-registration request. The P‑CSCF should perform the de-registration in any case, e.g., after the timer for this request expires; The S‑CSCF returns a response to the entity that initiated the process. If the UE does not perform automatic re-registration due to the de-registration the user shall be informed about the de-registration and of the reason, if available
  6. The scheme for authentication and key agreement in the IMS is called IMS AKA The generation of the authentication vector AV that includes RAND, XRES, CK, IK and AUTN shall be done in the same way as specified in TS 33.102  1st Registration Procedure: Upon receiving the SIP REGISTER the S‑CSCF CSCF shall use an Authentication Vector (AV) for authenticating and agreeing a key with the user. If the S‑CSCF has no valid AV then the S‑CSCF shall send a request for AV(s) to the HSS during the first registration process; Upon receipt of a request from the S‑CSCF, the HSS sends an ordered array of n authentication vectors to the S‑CSCF. The authentication vectors are ordered based on sequence number. Each authentication vector consists of the following components: a random number RAND, an expected response XRES, a cipher key CK, an integrity key IK and an authentication token AUTN; The S‑CSCF sends a SIP 401 Unauthorized i.e. an authentication challenge towards the UE including the challenge RAND, the authentication token AUTN. It also includes the integrity key IK and the cipher key CK for the P‑CSCF. The S‑CSCF also stores the RAND sent to the UE for use in case of a synchronization failure; When the P‑CSCF receives SM5 it shall store the key(s) and remove that information and forward the rest of the message to the UE (IMPI, RAND, AUTN); 2nd Registration Procedure: Upon receiving the challenge, the UE takes the AUTN, which includes a MAC and the SQN. The UE calculates the XMAC and checks that XMAC=MAC and that the SQN is in the correct range as in TS 33.102 [1]. If both these checks are successful the UE uses RES and some other parameters to calculate an authentication response. This response is put into the Authorization header and sent back to the registrar in second Registration. It should be noted that the UE at this stage also computes the session keys CK and IK; Upon receiving containing the response, the S‑CSCF retrieves the active XRES for that user and uses this to check the authentication response sent by the UE as described in RFC 3310. If the check is successful then the user has been authenticated and the IMPU is registered in the S‑CSCF.