SlideShare a Scribd company logo
1 of 14
Download to read offline
1
This slide shows the high-level sequence of events that take place prior to the IMS
registration
1. The UE attaches to the GPRS level
2. The UE establishes a PDP context. This may be a general PDP context or a dedicated
PDP context for IMS signalling. As a result, the UE gets an IPv6 /64 prefix. This allows
the UE to create an IPv6 address.
3. The UE performs the CSCF discovery procedure. As a result, the UE gets the IP
address of the P-CSCF allocated to the UE
4. The UE performs the IMS registration procedures
2
1. The UE sends a SIP REGISTER message. This message includes a Public User ID, the Private User ID, and
the home network SIP URI.
2. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards
the REGISTER request to that I-CSCF.
3. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user.
4. The HSS returns either:
• The address of the S-CSCF allocated to this user.
• A set of capabilities that will help the I-CSCF to choose an appropriate S-CSCF for this user.
5. The I-CSCF may choose a new S-CSCF or use an already allocated one. In both cases, it forwards the
REGISTER request to that S-CSCF.
6. The S-CSCF informs the HSS that this S-CSCF is taking care of the user.
7. The HSS returns one or more authentication vectors.
8. The S-CSCF challenges the UE.
9. The I-CSCF forwards the SIP response.
10. The P-CSCF forwards the SIP response to the UE.
3
The registration procedure continues:
11. The UE calculates the credentials, includes them into the REGISTER request, and
sends it to the P-CSCF.
12. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The
P-CSCF forwards the REGISTER request to that I-CSCF.
13. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this
user.
14. The HSS returns the address of the S-CSCF allocated to this user.
15. The I-CSCF forwards the REGISTER request to that S-CSCF.
16. The S-CSCF informs the HSS that this S-CSCF is taking care of the user.
17. The S-CSCF returns the user profile containing the filter criteria
18. The S-CSCF evaluates the filter criteria, and may contact, if needed, one ore more
application server. In this example, the filter criteria indicates that an application
server has to be informed about the user's registration. The S-CSCF creates a new
REGISTER (3rd party REGISTER)requests and sends to an application server.
19. The AS acknowledges the reception of the REGISTER request
20. The S-CSCF informs the UE about the successful registration.
21. The I-CSCF forwards the response.
22. The P-CSCF forwards the response
4
The Session Establishment procedures:
1. The UE sends an INVITE request through the originating leg (P-CSCF, optional I-CSCF
and S-CSCF). The INVITE request includes a Request-URI with the SIP URI of
destination subscriber.
2. The INVITE request contains a Route header that helps the P-CSCF to route the
INVITE request to the I-CSCF.
3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S-
CSCF.
4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A
does not have any originating services, so no AS is contacted. Then the S-CSCF
inspects the Request-URI to find the destination network. With the help of DNS, the
S-CSCF finds the entry point (I-CSCF) of Home B. The S-CSCF forwards the INVITE
request to that I-CSCF.
5. The I-CSCF queries the HSS to find out which S-CSCF is serving the destination
subscriber B.
6. The HSS returns the address of the S-CSCF serving subscriber B
7. The I-CSCF forwards the INVITE request to that S-CSCF
8. The S-CSCF evaluates the service criteria for subscriber B. In this example, there are
no AS involved. The S-CSCF, inspecting the Contact information (at registration),
forwards the INVITE request to the P-CSCF.
9. The P-CSCF forwards the INVITE request to the UA
10-16. UE B accepts the session. The 200 (OK) response is forwarded backwards to UE A.
5
Session initiation involving PSTN interworking:
1. The UE sends an INVITE request. The Request-URI (destination) contains a TEL URL.
2. The INVITE request contains a Route header that helps the P-CSCF to route the
INVITE request to the I-CSCF.
3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S-
CSCF.
4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A
does not have any originating services, so no AS is contacted. Then the S-CSCF
inspects the Request-URI to find the destination network. As the Request-URI
contains a TEL URL, the S-CSCF queries DNS to translate the TEL URL into a SIP URI.
5. The DNS returns a "no match" for this TEL URL.
6. The S-CSCF, as it has no options, routes the call to the BGCF in the home network.
7. The BGCF in the home network selects a suitable gateway operator (another BGCF)
8. The BGCF selects an appropriate MGCF.
9. The MGCF reserves resources (TDM slot, DSP processors, etc.) in the Media
Gateway.
10. The MG confirms the successful reservation of resources.
11. The MGCF initiates BICC/ISUP signalling towards the PSTN.
12. Eventually, the subscriber in the PSTN answers the call.
12-16 The call is completed.
6
This slide shows an example of a roaming subscriber initiating a session. Only the
originating leg of the session is shown. Note that there is not I-CSCF or HSS involved.
7
8
This slide shows an example of a roaming subscriber terminating a session. Only the
terminating leg of the session is shown. Note that there is not I-CSCF involved.
9
10
The service profile defines the service handling for a user at the S-CSCF. The profile itself
is a structured data format with the following information elements:
•Application address: The SIP URI the S-CSCF uses to address the application
•Filter criteria: This element specifies the conditions for the invocation of the
application. The condition is formulated as a filter rule, which can be applied to a SIP
request (e.g. request method, presence or absence of header, header contents, etc.).
The filter “language” allows formulating nearly arbitrary complex invocation rules.
•Application priority: The priority of an application determines the sequence of
application execution in case the invocation conditions of multiple applications match a
single SIP request received by the S-CSCF.
11
This slides shows an example of an application server involvement.
The service running in Application Server 33 is designed so that sessions received during business hours
from the user's mother are diverted to an automatic answering machine, but calls received outside
business hours proceed as usual.
The service running is Application Server 38 is a Call Forwarding Unconditional, but in this example, as the
answering machine service has priority, it is not triggered.
Note that AS 33 is acting as a User Agent (UA) for this particular instance of the service.
1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user,
sip:user1@home1.net
2. At registration time, the S-CSCF downloaded the user profile containing the Filter Criteria.
• The S-CSCF evaluates the user's Filter Criteria against the received INVITE request.
• The Filter Criteria indicates that:
• INVITE request
• Address to sip:user1@home1.net
• Where the originating subscriber is sip:users_mom@home1.net
• ACTION: forward the INVITE to the Application Server 33
• Therefore, the S-CSCF forwards the INVITE request to AS33.
3. AS33 evaluates the current time: It is 11:00. The logic of the service says that between 9 and 17 all
session attempts from the user's mother are diverted to an answering machine. The AS acts as a SIP
User Agent and returns a 200 OK response.
4. The 200 OK response is forwarded to the user's mother
The AS 33 plays some personalized welcome message and starts the recording of the message.
12
This slides shows an example of an application server involvement.
The service running in Application Server 33 is designed so that sessions received during business hours
from the user's mother are diverted to an automatic answering machine, but calls received outside
business hours proceed as usual.
The service running is Application Server 38 is a Call Forwarding Unconditional.
Note that AS 33 is acting as a proxy server for this particular instance of service.
1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user,
sip:user1@home1.net
2. The S-CSCF evaluates the user's Filter Criteria against the received INVITE request.
• The Filter Criteria indicates that:
• INVITE request
• Address to sip:user1@home1.net
• Where the originating subscriber is sip:users_mom@home1.net
• ACTION: forward the INVITE to the Application Server 33
• Therefore, the S-CSCF forwards the INVITE request to AS33.
3. AS33 evaluates the current time: It is 19:00. The logic of the service says that between 9 and 17 all
session attempts from the user's mother are diverted to an answering machine. Otherwise, the AS is
not interested in the signalling. The AS acts as a SIP proxy and forwards the INVITE request again to
the S-CSCF.
4. The S-CSCF continues the Filter Criteria evaluation. As a result of it, it forwards the INVITE to another
AS, AS 38.
5. AS 38 is a Call Forwarding AS. It re-writes the Request-URI (destination) to another location
(sip:user44@home33.net) where the user may be contacted. Acting as a SIP proxy, the AS 38
forwards the INVITE back to the S-CSCF
6. The S-CSCF finished the evaluation of the Filter Criteria. It routes the INVITE request based on the
destination (Request-URI). It forwards the INVITE to an entry point in home33.net network.
13
14

More Related Content

What's hot

End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...Vikas Shokeen
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core ElementsKent Loh
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVikas Shokeen
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedAmit Deshmukh
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
 
IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 mohammad norozzudegan
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenakerenumplatform
 

What's hot (20)

End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS Stack
 
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
Paging in LTE
Paging in LTEPaging in LTE
Paging in LTE
 
IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
 

Viewers also liked

General Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERGeneral Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERmohsen hussain
 
Реклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюРеклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюJulia Byelikova
 
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranTwo Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranCara Curran
 
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)mia maya aziza
 
Pembekalan kkn 2016
Pembekalan kkn 2016Pembekalan kkn 2016
Pembekalan kkn 2016cicit123
 
10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to AnalyticsXtage Labs
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysDepartment of Sport and Recreation
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiYusuf Saktian
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Feni Prasetiya
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahYusuf Saktian
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanIndependent
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimIsabelle Girard
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenFeni Prasetiya
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTERobert Seymour
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 

Viewers also liked (19)

Fahad surahio
Fahad surahioFahad surahio
Fahad surahio
 
cv2
cv2cv2
cv2
 
General Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTERGeneral Director Of Procurement -updated-MODIFIED COVERING LETTER
General Director Of Procurement -updated-MODIFIED COVERING LETTER
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 
Реклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістюРеклама та зв'язки з громадськістю
Реклама та зв'язки з громадськістю
 
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ CurranTwo Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
Two Month Old Infant Tetralogy of Fallot Post ECMO- NICU_ Curran
 
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
Referat ggn waham menetap prof.dr.jusuf simbolon, sp.kj (k)
 
Pembekalan kkn 2016
Pembekalan kkn 2016Pembekalan kkn 2016
Pembekalan kkn 2016
 
10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to Analytics
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathways
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - Halusinasi
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri Rendah
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia Pendidikan
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantren
 
Harga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.comHarga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.com
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTE
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 

Similar to IMS Call Follow

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfFabianLopez488132
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opernakruthi k
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detailGeorge Vlismas
 
HelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadHelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadDavid Riccitelli
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
COMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSCOMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSSaji banu
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure callsimnomus
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overviewFaisal Khan
 
Applying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadApplying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadYang Hong
 

Similar to IMS Call Follow (20)

Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdf
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
 
Rpc
RpcRpc
Rpc
 
Ims in ngn
Ims in ngnIms in ngn
Ims in ngn
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Converged office engineering detail
Converged office engineering detailConverged office engineering detail
Converged office engineering detail
 
Sip
SipSip
Sip
 
HelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed LoadHelixCloud Roadmap: Distributed Load
HelixCloud Roadmap: Distributed Load
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
SCE 2
SCE 2SCE 2
SCE 2
 
COMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMSCOMMUNICATION IN DISTRIBUTED SYSTEMS
COMMUNICATION IN DISTRIBUTED SYSTEMS
 
What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
Lecture9
Lecture9Lecture9
Lecture9
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure calls
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
 
IMS Signaling Details
IMS Signaling DetailsIMS Signaling Details
IMS Signaling Details
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
Applying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP OverloadApplying Control Theoretic Approach To Mitigate SIP Overload
Applying Control Theoretic Approach To Mitigate SIP Overload
 
Pcc efort eng
Pcc efort engPcc efort eng
Pcc efort eng
 

More from Houman Sadeghi Kaji

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Houman Sadeghi Kaji
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Houman Sadeghi Kaji
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementHouman Sadeghi Kaji
 

More from Houman Sadeghi Kaji (8)

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud Management
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
Ims naming identity
Ims naming identityIms naming identity
Ims naming identity
 
What is ims
What is imsWhat is ims
What is ims
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

IMS Call Follow

  • 1. 1
  • 2. This slide shows the high-level sequence of events that take place prior to the IMS registration 1. The UE attaches to the GPRS level 2. The UE establishes a PDP context. This may be a general PDP context or a dedicated PDP context for IMS signalling. As a result, the UE gets an IPv6 /64 prefix. This allows the UE to create an IPv6 address. 3. The UE performs the CSCF discovery procedure. As a result, the UE gets the IP address of the P-CSCF allocated to the UE 4. The UE performs the IMS registration procedures 2
  • 3. 1. The UE sends a SIP REGISTER message. This message includes a Public User ID, the Private User ID, and the home network SIP URI. 2. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards the REGISTER request to that I-CSCF. 3. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user. 4. The HSS returns either: • The address of the S-CSCF allocated to this user. • A set of capabilities that will help the I-CSCF to choose an appropriate S-CSCF for this user. 5. The I-CSCF may choose a new S-CSCF or use an already allocated one. In both cases, it forwards the REGISTER request to that S-CSCF. 6. The S-CSCF informs the HSS that this S-CSCF is taking care of the user. 7. The HSS returns one or more authentication vectors. 8. The S-CSCF challenges the UE. 9. The I-CSCF forwards the SIP response. 10. The P-CSCF forwards the SIP response to the UE. 3
  • 4. The registration procedure continues: 11. The UE calculates the credentials, includes them into the REGISTER request, and sends it to the P-CSCF. 12. The P-CSCF finds, with the help of DNS, the home network entry point (I-CSCF). The P-CSCF forwards the REGISTER request to that I-CSCF. 13. The I-CSCF queries the HSS to find out if there is an already allocated S-CSCF to this user. 14. The HSS returns the address of the S-CSCF allocated to this user. 15. The I-CSCF forwards the REGISTER request to that S-CSCF. 16. The S-CSCF informs the HSS that this S-CSCF is taking care of the user. 17. The S-CSCF returns the user profile containing the filter criteria 18. The S-CSCF evaluates the filter criteria, and may contact, if needed, one ore more application server. In this example, the filter criteria indicates that an application server has to be informed about the user's registration. The S-CSCF creates a new REGISTER (3rd party REGISTER)requests and sends to an application server. 19. The AS acknowledges the reception of the REGISTER request 20. The S-CSCF informs the UE about the successful registration. 21. The I-CSCF forwards the response. 22. The P-CSCF forwards the response 4
  • 5. The Session Establishment procedures: 1. The UE sends an INVITE request through the originating leg (P-CSCF, optional I-CSCF and S-CSCF). The INVITE request includes a Request-URI with the SIP URI of destination subscriber. 2. The INVITE request contains a Route header that helps the P-CSCF to route the INVITE request to the I-CSCF. 3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S- CSCF. 4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A does not have any originating services, so no AS is contacted. Then the S-CSCF inspects the Request-URI to find the destination network. With the help of DNS, the S-CSCF finds the entry point (I-CSCF) of Home B. The S-CSCF forwards the INVITE request to that I-CSCF. 5. The I-CSCF queries the HSS to find out which S-CSCF is serving the destination subscriber B. 6. The HSS returns the address of the S-CSCF serving subscriber B 7. The I-CSCF forwards the INVITE request to that S-CSCF 8. The S-CSCF evaluates the service criteria for subscriber B. In this example, there are no AS involved. The S-CSCF, inspecting the Contact information (at registration), forwards the INVITE request to the P-CSCF. 9. The P-CSCF forwards the INVITE request to the UA 10-16. UE B accepts the session. The 200 (OK) response is forwarded backwards to UE A. 5
  • 6. Session initiation involving PSTN interworking: 1. The UE sends an INVITE request. The Request-URI (destination) contains a TEL URL. 2. The INVITE request contains a Route header that helps the P-CSCF to route the INVITE request to the I-CSCF. 3. The I-CSCF, with the help of the Route header, forwards the INVITE request to the S- CSCF. 4. The S-CSCF evaluates the filter criteria for subscriber A. In this example, subscriber A does not have any originating services, so no AS is contacted. Then the S-CSCF inspects the Request-URI to find the destination network. As the Request-URI contains a TEL URL, the S-CSCF queries DNS to translate the TEL URL into a SIP URI. 5. The DNS returns a "no match" for this TEL URL. 6. The S-CSCF, as it has no options, routes the call to the BGCF in the home network. 7. The BGCF in the home network selects a suitable gateway operator (another BGCF) 8. The BGCF selects an appropriate MGCF. 9. The MGCF reserves resources (TDM slot, DSP processors, etc.) in the Media Gateway. 10. The MG confirms the successful reservation of resources. 11. The MGCF initiates BICC/ISUP signalling towards the PSTN. 12. Eventually, the subscriber in the PSTN answers the call. 12-16 The call is completed. 6
  • 7. This slide shows an example of a roaming subscriber initiating a session. Only the originating leg of the session is shown. Note that there is not I-CSCF or HSS involved. 7
  • 8. 8
  • 9. This slide shows an example of a roaming subscriber terminating a session. Only the terminating leg of the session is shown. Note that there is not I-CSCF involved. 9
  • 10. 10
  • 11. The service profile defines the service handling for a user at the S-CSCF. The profile itself is a structured data format with the following information elements: •Application address: The SIP URI the S-CSCF uses to address the application •Filter criteria: This element specifies the conditions for the invocation of the application. The condition is formulated as a filter rule, which can be applied to a SIP request (e.g. request method, presence or absence of header, header contents, etc.). The filter “language” allows formulating nearly arbitrary complex invocation rules. •Application priority: The priority of an application determines the sequence of application execution in case the invocation conditions of multiple applications match a single SIP request received by the S-CSCF. 11
  • 12. This slides shows an example of an application server involvement. The service running in Application Server 33 is designed so that sessions received during business hours from the user's mother are diverted to an automatic answering machine, but calls received outside business hours proceed as usual. The service running is Application Server 38 is a Call Forwarding Unconditional, but in this example, as the answering machine service has priority, it is not triggered. Note that AS 33 is acting as a User Agent (UA) for this particular instance of the service. 1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user, sip:user1@home1.net 2. At registration time, the S-CSCF downloaded the user profile containing the Filter Criteria. • The S-CSCF evaluates the user's Filter Criteria against the received INVITE request. • The Filter Criteria indicates that: • INVITE request • Address to sip:user1@home1.net • Where the originating subscriber is sip:users_mom@home1.net • ACTION: forward the INVITE to the Application Server 33 • Therefore, the S-CSCF forwards the INVITE request to AS33. 3. AS33 evaluates the current time: It is 11:00. The logic of the service says that between 9 and 17 all session attempts from the user's mother are diverted to an answering machine. The AS acts as a SIP User Agent and returns a 200 OK response. 4. The 200 OK response is forwarded to the user's mother The AS 33 plays some personalized welcome message and starts the recording of the message. 12
  • 13. This slides shows an example of an application server involvement. The service running in Application Server 33 is designed so that sessions received during business hours from the user's mother are diverted to an automatic answering machine, but calls received outside business hours proceed as usual. The service running is Application Server 38 is a Call Forwarding Unconditional. Note that AS 33 is acting as a proxy server for this particular instance of service. 1. The S-CSCF receives an INVITE request. The Request-URI contains the destination user, sip:user1@home1.net 2. The S-CSCF evaluates the user's Filter Criteria against the received INVITE request. • The Filter Criteria indicates that: • INVITE request • Address to sip:user1@home1.net • Where the originating subscriber is sip:users_mom@home1.net • ACTION: forward the INVITE to the Application Server 33 • Therefore, the S-CSCF forwards the INVITE request to AS33. 3. AS33 evaluates the current time: It is 19:00. The logic of the service says that between 9 and 17 all session attempts from the user's mother are diverted to an answering machine. Otherwise, the AS is not interested in the signalling. The AS acts as a SIP proxy and forwards the INVITE request again to the S-CSCF. 4. The S-CSCF continues the Filter Criteria evaluation. As a result of it, it forwards the INVITE to another AS, AS 38. 5. AS 38 is a Call Forwarding AS. It re-writes the Request-URI (destination) to another location (sip:user44@home33.net) where the user may be contacted. Acting as a SIP proxy, the AS 38 forwards the INVITE back to the S-CSCF 6. The S-CSCF finished the evaluation of the Filter Criteria. It routes the INVITE request based on the destination (Request-URI). It forwards the INVITE to an entry point in home33.net network. 13
  • 14. 14