没有合适的资源?快使用搜索试试~ 我知道了~
3rd Generation Partnership Project;
需积分: 14 10 下载量 8 浏览量
2011-05-02
14:51:31
上传
评论
收藏 14.96MB DOC 举报
温馨提示
试读
64页
3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 (Release 8)
资源详情
资源评论
资源推荐
3GPP TS 24.229 V8.7.0
(2009-03)
Technical Specification
3rd Generation Partnership Project;
Technical Specification Group Core Network and Terminals;
IP multimedia call control protocol based on
Session Initiation Protocol (SIP)
and Session Description Protocol (SDP);
Stage 3
(Release 8)
The present document has been developed within the 3
rd
Generation Partnership Project (3GPP
TM
) and may be further elaborated for the purposes of 3GPP.
The present document has not been subject to any approval process by the 3GPP
Organizational Partners and shall not be implemented.
This Specification is provided for future development work within 3GPP
only. The Organizational Partners accept no liability for any use of this
Specification.
Specifications and reports for implementation of the 3GPP
TM
system should be obtained via the 3GPP Organizational Partners' Publications Offices.
3GPP
Keywords
UMTS, Network, IP, SIP, SDP, multimedia, LTE
3GPP
Postal address
3GPP support office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Internet
http://www.3gpp.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© 2009, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC).
All rights reserved.
UMTS™ is a Trade Mark of ETSI registered for the benefit of its members
3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
LTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners
GSM® and the GSM logo are registered and owned by the GSM Association
3GPP TS 24.229 V8.7.0 (2009-03)2Release 8
Contents
Foreword.................................................................................................................................................23
1 Scope....................................................................................................................................................24
2 References............................................................................................................................................24
3 Definitions and abbreviations...............................................................................................................34
3.1 Definitions............................................................................................................................................................34
3.2 Abbreviations.......................................................................................................................................................39
3A Interoperability with different IP-CAN.............................................................................................41
4 General.................................................................................................................................................42
4.1 Conformance of IM CN subsystem entities to SIP, SDP and other protocols.....................................................42
4.2 URI and address assignments...............................................................................................................................44
4.2A Transport mechanisms.......................................................................................................................................45
4.2B Security mechanisms.........................................................................................................................................46
4.3 Routeing principles of IM CN subsystem entities...............................................................................................47
4.4 Trust domain........................................................................................................................................................47
4.4.1 General 47
4.4.2 P-Asserted-Identity...........................................................................................................................................48
4.4.3 P-Access-Network-Info.....................................................................................................................................48
4.4.4 History-Info.......................................................................................................................................................48
4.4.5 P-Asserted-Service............................................................................................................................................48
4.4.6 Resource-Priority..............................................................................................................................................48
4.4.7 Reason (in a response)......................................................................................................................................48
4.4.8 P-Profile-Key....................................................................................................................................................48
4.4.9 P-Served-User...................................................................................................................................................48
4.4.10 P-Private-Network-Indication.........................................................................................................................49
4.5 Charging correlation principles for IM CN subsystems......................................................................................49
4.5.1 Overview...........................................................................................................................................................49
4.5.2 IM CN subsystem charging identifier (ICID)...................................................................................................49
4.5.3 Access network charging information..............................................................................................................50
4.5.3.1 General 50
4.5.3.2 Access network charging information...........................................................................................................50
4.5.4 Inter operator identifier (IOI)............................................................................................................................50
4.5.5 Charging function addresses.............................................................................................................................51
4.6 Support of local service numbers.........................................................................................................................51
4.7 Emergency service...............................................................................................................................................51
4.8 Tracing of signalling............................................................................................................................................52
4.8.1 General 52
4.8.2 Trace depth........................................................................................................................................................52
4.9 Overlap signalling................................................................................................................................................52
4.9.1 General 52
4.9.2 Overlap signalling methods...............................................................................................................................52
4.9.2.1 In-dialog method............................................................................................................................................52
4.9.2.1.1 General 52
4.9.2.2 Multiple-INVITE method..............................................................................................................................52
4.9.2.2.1 General 52
4.9.3 Routeing impacts...............................................................................................................................................53
4.9.3.1 General 53
4.9.3.2 Deterministic routeing....................................................................................................................................53
4.9.3.3 Digit collection...............................................................................................................................................53
5 Application usage of SIP......................................................................................................................53
5.1 Procedures at the UE............................................................................................................................................53
5.1.0 General 53
5.1.1 Registration and authentication.........................................................................................................................54
5.1.1.1 General 54
3GPP
3GPP TS 24.229 V8.7.0 (2009-03)3Release 8
5.1.1.1A Parameters contained in the ISIM...............................................................................................................54
5.1.1.1B Parameters provisioned to a UE without ISIM or USIM............................................................................55
5.1.1.1B.1 Parameters provisioned in the IMC..........................................................................................................55
5.1.1.1B.2 Parameters when UE does not contain ISIM, USIM or IMC...................................................................55
5.1.1.2 Initial registration...........................................................................................................................................55
5.1.1.2.1 General 55
5.1.1.2.2 Initial registration using IMS AKA.............................................................................................................57
5.1.1.2.3 Initial registration using SIP digest without TLS........................................................................................58
5.1.1.2.4 Initial registration using SIP digest with TLS.............................................................................................59
5.1.1.2.5 Initial registration using NASS-IMS bundled authentication.....................................................................59
5.1.1.2.6 Initial registration using GPRS-IMS-Bundled authentication....................................................................60
5.1.1.3 Subscription to the registration-state event package......................................................................................60
5.1.1.3A Subscription to the debug event package....................................................................................................61
5.1.1.4 User-initiated reregistration and registration of an additional public user identity........................................62
5.1.1.4.1 General 62
5.1.1.4.2 IMS AKA as a security mechanism............................................................................................................64
5.1.1.4.3 SIP digest without TLS as a security mechanism.......................................................................................64
5.1.1.4.4 SIP digest with TLS as a security mechanism............................................................................................65
5.1.1.4.5 NASS-IMS bundled authentication as a security mechanism.....................................................................65
5.1.1.4.6 GPRS-IMS-Bundled authentication as a security mechanism....................................................................65
5.1.1.5 Authentication................................................................................................................................................66
5.1.1.5.1 IMS AKA - general.....................................................................................................................................66
5.1.1.5.2 Void 67
5.1.1.5.3 IMS AKA abnormal cases..........................................................................................................................67
5.1.1.5.4 SIP digest without TLS – general...............................................................................................................68
5.1.1.5.5 SIP digest without TLS – abnormal procedures.........................................................................................68
5.1.1.5.6 SIP digest with TLS – general....................................................................................................................68
5.1.1.5.7 SIP digest with TLS – abnormal procedures...............................................................................................69
5.1.1.5.8 NASS-IMS bundled authentication – general.............................................................................................69
5.1.1.5.9 NASS-IMS bundled authentication – abnormal procedures.......................................................................69
5.1.1.5.10 GPRS-IMS-Bundled authentication – general..........................................................................................69
5.1.1.5.11 GPRS-IMS-Bundled authentication – abnormal procedures....................................................................69
5.1.1.5.12 Abnormal procedures for all security mechanisms...................................................................................69
5.1.1.5A Network-initiated re-authentication............................................................................................................69
5.1.1.5B Change of IPv6 address due to privacy.......................................................................................................70
5.1.1.6 User-initiated deregistration...........................................................................................................................70
5.1.1.6.1 General 70
5.1.1.6.2 IMS AKA as a security mechanism............................................................................................................71
5.1.1.6.3 SIP digest without TLS as a security mechanism.......................................................................................72
5.1.1.6.4 SIP digest with TLS as a security mechanism............................................................................................72
5.1.1.6.5 NASS-IMS bundled authentication as a security mechanism.....................................................................73
5.1.1.6.6 GPRS-IMS-Bundled authentication as a security mechanism....................................................................73
5.1.1.7 Network-initiated deregistration....................................................................................................................73
5.1.2 Subscription and notification............................................................................................................................74
5.1.2.1 Notification about multiple registered public user identities.........................................................................74
5.1.2.2 General SUBSCRIBE requirements..............................................................................................................75
5.1.2A Generic procedures applicable to all methods excluding the REGISTER method........................................75
5.1.2A.1 UE-originating case.....................................................................................................................................75
5.1.2A.1.1 General 75
5.1.2A.1.2 Structure of Request-URI.........................................................................................................................79
5.1.2A.1.3 UE without dial string processing capabilities.........................................................................................79
5.1.2A.1.4 UE with dial string processing capabilities..............................................................................................80
5.1.2A.1.5 Setting the "phone-context" tel URI parameter........................................................................................80
5.1.2A.1.6 Abnormal cases........................................................................................................................................81
5.1.2A.2 UE-terminating case....................................................................................................................................81
5.1.3 Call initiation - UE-originating case.................................................................................................................83
5.1.3.1 Initial INVITE request...................................................................................................................................83
5.1.4 Call initiation - UE-terminating case................................................................................................................85
5.1.4.1 Initial INVITE request...................................................................................................................................85
5.1.5 Call release........................................................................................................................................................86
5.1.6 Emergency service............................................................................................................................................86
3GPP
3GPP TS 24.229 V8.7.0 (2009-03)4Release 8
5.1.6.1 General 86
5.1.6.2 Initial emergency registration........................................................................................................................86
5.1.6.2A New initial emergency registration.............................................................................................................87
5.1.6.3 Initial subscription to the registration-state event package............................................................................87
5.1.6.4 User-initiated emergency reregistration.........................................................................................................87
5.1.6.5 Authentication................................................................................................................................................87
5.1.6.6 User-initiated emergency deregistration........................................................................................................87
5.1.6.7 Network-initiated emergency deregistration..................................................................................................88
5.1.6.8 Emergency session setup................................................................................................................................88
5.1.6.8.1 General 88
5.1.6.8.2 Emergency session set-up in case of no registration...................................................................................88
5.1.6.8.3 Emergency session set-up within an emergency registration.....................................................................90
5.1.6.8.4 Emergency session setup within a non-emergency registration.................................................................91
5.1.6.9 Emergency session release.............................................................................................................................93
5.1.6.10 Response to non-UE detectable emergency call..........................................................................................93
5.1.7 Void 94
5.1.8 Maintaining flows and detecting flow failures..................................................................................................94
5.2 Procedures at the P-CSCF....................................................................................................................................94
5.2.1 General 94
5.2.2 Registration.......................................................................................................................................................96
5.2.2.1 General 96
5.2.2.2 IMS AKA as a security mechanism...............................................................................................................99
5.2.2.3 SIP digest without TLS as a security mechanism........................................................................................102
5.2.2.4 SIP digest with TLS as a security mechanism.............................................................................................103
5.2.2.5 NASS-IMS bundled authentication as a security mechanism......................................................................104
5.2.2.6 GPRS-IMS-Bundled authentication as a security mechanism.....................................................................105
5.2.3 Subscription to the user's registration-state event package.............................................................................105
5.2.3A Subscription to the user's debug event package...........................................................................................106
5.2.4 Registration of multiple public user identities................................................................................................106
5.2.5 Deregistration..................................................................................................................................................107
5.2.5.1 User-initiated deregistration.........................................................................................................................107
5.2.5.2 Network-initiated deregistration..................................................................................................................108
5.2.6 General treatment for all dialogs and standalone transactions excluding the REGISTER method................109
5.2.6.1 Introduction..................................................................................................................................................109
5.2.6.2 Determination of UE-originated or UE-terminated case.............................................................................109
5.2.6.3 Requests initiated by the UE........................................................................................................................109
5.2.6.3.1 General for all requests.............................................................................................................................109
5.2.6.3.2 General for all responses...........................................................................................................................110
5.2.6.3.2A Abnormal cases......................................................................................................................................110
5.2.6.3.3 Initial request for a dialog.........................................................................................................................110
5.2.6.3.4 Responses to an initial request for a dialog...............................................................................................112
5.2.6.3.5 Target refresh request for a dialog............................................................................................................112
5.2.6.3.6 Responses to a target refresh request for a dialog.....................................................................................113
5.2.6.3.7 Request for a standalone transaction.........................................................................................................113
5.2.6.3.8 Responses to a request for a standalone transaction.................................................................................114
5.2.6.3.9 Subsequent request other than a target refresh request.............................................................................114
5.2.6.3.10 Responses to a subsequent request other than a target refresh request...................................................115
5.2.6.3.11 Request for an unknown method that does not relate to an existing dialog............................................115
5.2.6.3.12 Responses to a request for an unknown method that does not relate to an existing dialog....................116
5.2.6.4 Requests terminated by the UE....................................................................................................................116
5.2.6.4.1 General for all requests.............................................................................................................................116
5.2.6.4.2 General for all responses...........................................................................................................................116
5.2.6.4.3 Initial request for a dialog.........................................................................................................................116
5.2.6.4.4 Responses to an initial request for a dialog...............................................................................................117
5.2.6.4.5 Target refresh request for a dialog............................................................................................................118
5.2.6.4.6 Responses to a target refresh request for a dialog.....................................................................................119
5.2.6.4.7 Request for a standalone transaction.........................................................................................................119
5.2.6.4.8 Responses to a request for a standalone transaction.................................................................................120
5.2.6.4.9 Subsequent request other than a target refresh request.............................................................................121
5.2.6.4.10 Responses to a subsequent request other than a target refresh request...................................................121
5.2.6.4.11 Request for an unknown method that does not relate to an existing dialog............................................121
3GPP
3GPP TS 24.229 V8.7.0 (2009-03)5Release 8
剩余63页未读,继续阅读
gf_ren
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 农村信用社联合社计算机信息系统投产与变更管理办.docx
- 农村信用社联合社计算机信息系统数据管理办法.docx
- 利用SPSS作临床效度分析线上计算网站介绍-医学研究部统计谘.(医学PPT课件).ppt
- 利用Zabbix监控mysqldump定时备份数据库状态.docx
- 利用计算机解决问题的基本过程.doc
- 化工铁路通信工程总结.doc
- 北京大学网络教育软件工程作业.docx
- 医药公司(连锁店)计算机操作规程未新系统的自行按照旧制修改-新系统过制的编号加修模版.doc
- 医药公司(连锁店)计算机系统操作规程模版.doc
- 医药连锁门店计算机系统的操作和管理程序未新系统的自行按照旧制修改-新系统过制的编号加修模版.docx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0