LEADER 05535nam 2200733Ia 450 001 9910957442103321 005 20200520144314.0 010 $a9786610273904 010 $a9781280273902 010 $a1280273909 010 $a9780470871140 010 $a0470871148 010 $a9780470871157 010 $a0470871156 035 $a(CKB)1000000000018905 035 $a(EBL)210582 035 $a(OCoLC)56748852 035 $a(SSID)ssj0000177552 035 $a(PQKBManifestationID)11169633 035 $a(PQKBTitleCode)TC0000177552 035 $a(PQKBWorkID)10217458 035 $a(PQKB)10644235 035 $a(MiAaPQ)EBC210582 035 $a(Au-PeEL)EBL210582 035 $a(CaPaEBR)ebr10113995 035 $a(CaONFJC)MIL27390 035 $a(Perlego)2784552 035 $a(EXLCZ)991000000000018905 100 $a20040518d2004 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe IMS $eIP multimedia concepts and services in the mobile domain /$fMiikka Poikselka ... [et al.] 205 $a1st ed. 210 $aChichester $cJohn Wiley & Sons$dc2004 215 $a1 online resource (449 p.) 300 $aDescription based upon print version of record. 311 08$a9780470871133 311 08$a047087113X 320 $aIncludes bibliographical references and index. 327 $aContents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; PART I: ARCHITECTURE; 1 Introduction; 1.1 Why the Internet Protocol Multimedia Subsystem was developed; 1.2 Where did it come from?; 1.3 Other relevant standardization bodies; 2 IP Multimedia Subsystem Architecture; 2.1 Architectural requirements; 2.2 Description of IMS-related entities and functionalities; 2.3 IMS reference points; 3 IMS Concepts; 3.1 Overview; 3.2 Registration; 3.3 Session initiation; 3.4 Identification; 3.5 Identity modules; 3.6 Security services in the IMS; 3.7 Discovering the IMS entry point 327 $a3.8 S-CSCF assignment 3.9 Mechanism for controlling bearer traffic; 3.10 Charging; 3.11 User profile; 3.12 Service provision; 3.13 Connectivity between traditional Circuit-Switched users and IMS users; 3.14 Mechanism to register multiple user identities at once; 3.15 Sharing a single user identity between multiple terminals; 3.16 SIP compression; PART II: DETAILED PROCEDURES; 4 Introduction; 4.1 The example scenario; 4.2 Base standards; 5 An example IMS registration; 5.1 Overview; 5.2 Signalling PDP context establishment; 5.3 P-CSCF discovery; 5.4 Transport protocols 327 $a5.5 SIP registration and registration routing aspects 5.6 Authentication; 5.7 Access security-IPsec SAs; 5.8 SIP Security Mechanism Agreement; 5.9 Compression negotiation; 5.10 Access and location information; 5.11 Charging-related information during registration; 5.12 User identities; 5.13 Re-registration and re-authentication; 5.14 De-registration; 6 An Example IMS Session; 6.1 Overview; 6.2 Caller and callee identities; 6.3 Routing; 6.4 Compression negotiation; 6.5 Media negotiation; 6.6 Resource reservation; 6.7 Controlling the media; 6.8 Charging-related information for sessions 327 $a6.9 Release of a session 7 Routing of PSIs; 7.1 Scenario 1: routing from a user to a PSI; 7.2 Scenario 2: routing from a PSI to a user; 7.3 Scenario 3: routing from a PSI to another PSI; PART III: PROTOCOLS; 8 SIP; 8.1 Background; 8.2 Design principles; 8.3 SIP architecture; 8.4 Message format; 8.5 The SIP URI; 8.6 The tel URI; 8.7 SIP structure; 8.8 Registration; 8.9 Dialogs; 8.10 Sessions; 8.11 Security; 8.12 Routing requests and responses; 8.13 SIP extensions; 9 SDP; 9.1 SDP message contents; 9.2 SDP message format; 9.3 Selected SDP lines; 10 The Offer/Answer Model with SDP; 10.1 The offer 327 $a10.2 The answer 10.3 Offer/Answer processing; 11 RTP; 11.1 RTP for real-time data delivery; 11.2 RTCP; 11.3 RTP profile and payload format specifications; 11.4 RTP profile and payload format specification for audio and video (RTP/AVP); 12 DNS; 12.1 DNS resource records; 12.2 The naming authority pointer (NAPTR) DNS RR; 12.3 ENUM - the E.I64 to URI Dynamic Delegation Discovery System (DDD) application; 12.4 Service records (SRVs); 13 GPRS; 13.1 Overview; 13.2 Packet Data Protocol (PDP); 13.3 Access points; 13.4 PDP context types; 14 TLS; 14.1 Introduction; 14.2 TLS Record Protocol 327 $a14.3 TLS Handshake Protocol 330 $aWe have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile telephony with the current technology has been hugely successful and shows that there is immense value in communicating with peers while being mobile, and with increasingly available smarter multimedia terminals the communication experience will be some 606 $aComputer network protocols 606 $aInternet telephony 606 $aMultimedia systems 615 0$aComputer network protocols. 615 0$aInternet telephony. 615 0$aMultimedia systems. 676 $a004.62 701 $aPoikselka$b Miikka$0892237 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910957442103321 996 $aThe IMS$94362528 997 $aUNINA