scispace - formally typeset
Search or ask a question
Book

The 3G IP Multimedia Subsystem (IMS) : Merging the Internet and the Cellular Worlds

TL;DR: This book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture, and provides details on the latest policy technology and security architecture written by experienced professionals in the field.
Abstract: Third edition of this best-selling guide to IMS: fully revised, and updated with brand new material The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world. It makes Internet technologies such as the web, email, instant messaging, presence, and videoconferencing available nearly everywhere at any time. The third edition of this bestselling book is fully updated and provides comprehensively expanded content, including new chapters on emergency calls and on Voice Call Continuity (VCC). As well as this, The 3G IP Multimedia Subsystem (IMS) presents updated material including a comprehensive picture of Session Initiation Protocol (SIP) as well as its applicability to IMS. As most of the protocols have been designed in the IETF, this book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture. This is an indispensable guide for engineers, programmers, business managers, marketing representatives and technically aware users who want to understand how the IMS works and explore the business model behind it. New chapters on emergency calls, Voice Call Continuity (VCC), service configuration (XCAP, XDM), and conferencing Fully updated throughout, including Policy and Charging Control (PCC), QoS, Presence, Instant Messaging, Multimedia Telephony Services, and Push-to-talk over Cellular (PoC) Describes the IP Multimedia Subsystem from two different perspectives: from the IETF perspective, and from the 3GPP perspective. Provides details on the latest policy technology and security architecture Written by experienced professionals in the field.
Citations
More filters
Journal ArticleDOI
TL;DR: The fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities are described.
Abstract: Integrating the various embedded devices and systems in our environment enables an Internet of Things (IoT) for a smart city. The IoT will generate tremendous amount of data that can be leveraged for safety, efficiency, and infotainment applications and services for city residents. The management of this voluminous data through its lifecycle is fundamental to the realization of smart cities. Therefore, in contrast to existing surveys on smart cities we provide a data-centric perspective, describing the fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities. Essentially, the data lifecycle in a smart city is dependent on tightly coupled data management with cross-cutting layers of data security and privacy, and supporting infrastructure. Therefore, we further identify techniques employed for data security and privacy, and discuss the networking and computing technologies that enable smart cities. We highlight the achievements in realizing various aspects of smart cities, present the lessons learned, and identify limitations and research challenges.

390 citations

Journal ArticleDOI
TL;DR: IMS is examined from a mobile operator's perspective and its possible adaptation to the next-generation networks is analysed.
Abstract: As third-generation (mobile) networks (3G networks) become a commercial reality, strong movements are emerging in the direction of a common infrastructure based on the Internet protocol (IP) The users' mobile devices are like another IP host connected to the Internet In such a scenario, the network operator infrastructure is degraded to bit pipes To avoid this, the 3G partnership project (3GPP) and ETSI TISPAN have designed IP multimedia subsystem (IMS), a service platform that aims to place the network operator again in the central role of service provisioning In this article we examine IMS from a mobile operator's perspective and analyse its possible adaptation to the next-generation networks

146 citations

Journal ArticleDOI
TL;DR: A novel learning scheme called cost-to-learn is introduced that incorporates the cost to switch, the switching delay, and the cost of changing to a new action and, captures the realistic behavior of the users that has been experimented on OPNET simulations.
Abstract: In this paper, we study game dynamics and learning schemes for heterogeneous 4G networks. We introduce a novel learning scheme called cost-to-learn that incorporates the cost to switch, the switching delay, and the cost of changing to a new action and, captures the realistic behavior of the users that we have experimented on OPNET simulations. Considering a dynamic and uncertain environment where the users and operators have only a numerical value of their own payoffs as information, we construct various heterogeneous combined fully distributed payoff and strategy reinforcement learning (CODIPAS-RL): the users try to learn their own optimal payoff and their optimal strategy simultaneously. We establish the asymptotic pseudo-trajectories as solution of differential equations. Using evolutionary game dynamics, we prove the convergence and stability properties in specific classes of dynamic robust games. We provide various numerical examples and OPNET simulations in the context network selection in wireless local area networks (WLAN) and Long Term Evolution (LTE).

143 citations


Cites background from "The 3G IP Multimedia Subsystem (IMS..."

  • ...We assume that there exists a neutral and trusted third party, Telecommunication Service Provider (TSP), the TSP has no Radio Access Network (RAN) infrastructure, however it contains few functional components of IMS architecture namely Proxy Call Session Control Function (P-CSCF), Serving Call Session Control Function (S-CSCF), Interrogating Call Session Control Function (I-CSCF), Application server (AS), and HSS[26]....

    [...]

Proceedings ArticleDOI
Arun Kumar1, Nitendra Rajput1, Dipanjan Chakraborty1, Sheetal K. Agarwal1, Amit A. Nanavati1 
27 Aug 2007
TL;DR: WWTW is a network of interconnected voice sites that are voice driven applications created by users and hosted in the network that has the potential to enable the underprivileged population to become a part of the next generation converged networked world.
Abstract: The World Wide Web (WWW) enabled quick and easy information dissemination and brought about fundamental changes to various aspects of our lives. However, a very large number of people, mostly in developing regions, are still untouched by this revolution. Compared to PCs, the primary access mechanism to WWW, mobile phones have made a phenomenal penetration into this population segment. Low cost of ownership, the simple user interface consisting of a small keyboard, limited menu and voice-based access contribute to the success of mobile phones with the less literate. However, apart from basic voice communication, these people are not being able to exploit the benefits of information and services available to WWW users.In this paper, we present the World Wide Telecom Web (WWTW) --- our vision of a voice-driven ecosystem parallel to that of the WWW. WWTW is a network of interconnected voice sites that are voice driven applications created by users and hosted in the network. It has the potential to enable the underprivileged population to become a part of the next generation converged networked world. We present a whole gamut of existing technology enablers for our vision as well as present research directions and open challenges that need to be solved to not only realize a WWTW but also to enable the two Webs to cross leverage each other.

107 citations

Patent
31 Dec 2007
TL;DR: In this paper, an apparatus for managing mobile network services is described, which includes a service authorization and utilization control function (SAUCF) element configured to authorize a mobile network service request by acting as a service manager.
Abstract: An apparatus is described for managing mobile network services. The apparatus includes a service authorization and utilization control function (SAUCF) element configured to authorize a mobile network service request by acting as a service manager configured to centrally coordinate service authorizations for multiple network services associated with an individual subscriber account by evaluating a service policy defining user access spanning the multiple network services. The service policy includes (a) communication authorization controls affecting permission for a user associated with the subscriber account to access a mobile network service in accordance with one or more criteria applicable to a bundled service category; and (b) charging controls for determining whether a subscriber account includes sufficient credits to use the mobile network service. A real time utilization interface is configured to transmit messages between the SAUCF element and a subscriber service utilization account.

81 citations