3GPP TS 24.229 V17.3.1 (2021-06)
4.5.8.2 Tracking of IM CN subsystem functional entities generating charging information.............................86
4.5.8.3 Tracking of applications generating charging information ....................................................................87
4.6 Support of local service numbers ......................................................................................................................87
4.7 Emergency service.............................................................................................................................................87
4.7.1 Introduction..................................................................................................................................................87
4.7.2 Emergency calls generated by a UE ............................................................................................................87
4.7.3 Emergency calls generated by an AS...........................................................................................................88
4.7.4 Emergency calls received from an enterprise network ................................................................................88
4.7.5 Location in emergency calls ........................................................................................................................88
4.7.6 eCall type of emergency service ..................................................................................................................89
4.8 Tracing of signalling..........................................................................................................................................89
4.8.1 General.........................................................................................................................................................89
4.8.2 Trace depth...................................................................................................................................................89
4.9 Overlap signalling..............................................................................................................................................90
4.9.1 General.........................................................................................................................................................90
4.9.2 Overlap signalling methods .........................................................................................................................90
4.9.2.1 In-dialog method ....................................................................................................................................90
4.9.2.1.1 General..............................................................................................................................................90
4.9.2.2 Multiple-INVITE method ......................................................................................................................90
4.9.2.2.1 General..............................................................................................................................................90
4.9.3 Routeing impacts .........................................................................................................................................90
4.9.3.1 General ...................................................................................................................................................90
4.9.3.2 Deterministic routeing............................................................................................................................90
4.9.3.3 Digit collection.......................................................................................................................................91
4.10 Dialog correlation for IM CN subsystems.........................................................................................................91
4.10.1 General.........................................................................................................................................................91
4.10.2 CONF usage.................................................................................................................................................91
4.11 Priority mechanisms ..........................................................................................................................................91
4.12 Overload control ................................................................................................................................................93
4.13 II-NNI traversal scenario ...................................................................................................................................94
4.13.1 General.........................................................................................................................................................94
4.13.2 Identifying the II-NNI traversal scenario.....................................................................................................94
4.13.3 Security aspects............................................................................................................................................94
4.14 Restoration procedures ......................................................................................................................................94
4.14.1 General.........................................................................................................................................................94
4.14.2 P-CSCF restoration procedures....................................................................................................................95
4.14.3 S-CSCF restoration procedures....................................................................................................................95
4.15 Resource sharing................................................................................................................................................95
4.16 Priority sharing ..................................................................................................................................................96
4.17 3GPP PS data off ...............................................................................................................................................96
4.18 Dynamic Service Interaction .............................................................................................................................97
4.19 Restricted Local Operator Services ...................................................................................................................97
5 Application usage of SIP ........................................................................................................................97
5.1 Procedures at the UE .........................................................................................................................................97
5.1.0 General.........................................................................................................................................................97
5.1.1 Registration and authentication....................................................................................................................98
5.1.1.1 General ...................................................................................................................................................98
5.1.1.1A Parameters contained in the ISIM ..........................................................................................................98
5.1.1.1B Parameters provisioned to a UE without ISIM or USIM .......................................................................99
5.1.1.1B.1 Parameters provisioned in the IMC ..................................................................................................99
5.1.1.1B.2 Parameters when UE does not contain ISIM, USIM or IMC...........................................................99
5.1.1.2 Initial registration ...................................................................................................................................99
5.1.1.2.1 General..............................................................................................................................................99
5.1.1.2.2 Initial registration using IMS AKA ................................................................................................105
5.1.1.2.3 Initial registration using SIP digest without TLS ...........................................................................106
5.1.1.2.4 Initial registration using SIP digest with TLS ................................................................................106
5.1.1.2.5 Initial registration using NASS-IMS bundled authentication.........................................................107
5.1.1.2.6 Initial registration using GPRS-IMS-Bundled authentication........................................................107
5.1.1.3 Subscription to the registration-state event package ............................................................................107
5.1.1.3A Void......................................................................................................................................................108
5.1.1.4 User-initiated reregistration and registration of an additional public user identity..............................108