睡觉口干舌燥什么原因| 腿浮肿是什么原因| 属龙的和什么属相最配| 困水是什么意思| 腰脱是什么症状| 婴儿便秘怎么办什么方法最有效| 霖五行属性是什么| 剁椒是什么辣椒| 大校是什么级别| 地贫是什么病| 双下肢水肿是什么原因| av是什么| 脱线是什么意思| 喝桦树茸有什么好处| 刘邦和刘备是什么关系| lof是什么意思| 大便酸臭味是什么原因| 什么是命中注定| 89年蛇是什么命| 佝偻病是什么病| 鼻子流血什么原因| 身上总是痒是什么原因| 麦麸是什么意思| 车顶放饮料是什么意思| 清风明月什么意思| 花瓣是什么意思| 在家无聊可以做什么| 拉肚子想吐是什么原因| 什么情况下需做肠镜| 铋剂是什么药| 少年班是什么意思| 什么人不能吃蚕豆| 黑枸杞泡水喝有什么作用和功效| 银杏叶片有什么作用| 电视剧靠什么赚钱| 高中学考是什么意思| 内膜厚是什么原因引起的| 上市公司是什么意思| 赫尔墨斯是什么神| 男生生日礼物送什么| 粉尘螨过敏是什么意思| 秋天有什么水果成熟| 脚脖子肿是什么原因| 金字旁加巨念什么| 指甲竖纹是什么原因| 木乐读什么| 门户网站是什么| 水煎是什么意思| 小苏打是什么成分| 小猫为什么会踩奶| skp是什么品牌| 1977年五行属什么| 李亚男为什么选王祖蓝| 玫瑰花可以和什么一起泡水喝| 优甲乐是什么药| 烦躁不安的意思是什么| 雨伞代表什么数字| 布谷鸟是什么鸟| egfr医学上是什么意思| 你好是什么意思| 脂肪肝是什么原因造成的| 指腹为婚是什么意思| 什么是结膜炎| 2月是什么星座的| 9月24号什么星座| 一马平川是什么生肖| 皮试阳性是什么意思| 肝火旺盛吃什么| 一面之词是什么意思| 正月初十是什么星座| 吃什么补钾最快最好| 腥臭味是什么妇科病| 脚踝扭伤挂什么科| 产妇吃什么下奶快又多又营养| 调月经吃什么药好| 打喷嚏流鼻涕吃什么药好| 光子嫩肤是什么| 喝酒吃头孢有什么反应| 氨水是什么东西| 鼻子上火吃什么药| 暑湿感冒吃什么药| 多吃山竹有什么好处| 生理年龄是什么意思| wwe是什么意思| 出道是什么意思| 晚上20点是什么时辰| 莲子心泡水喝有什么功效和作用| crp高是什么意思| 喝茶有什么好处和坏处| 为什么手比脸白那么多| 足癣用什么药最快好| 1950属什么生肖| 阿胶有什么功效| 2025是什么生肖年| 什么时候普及高中义务教育| 三界牌是什么| rh因子阳性是什么意思| 在什么前面用英语怎么说| 蚂蚁的触角有什么作用| 梦中的梦中是什么歌| 低血糖吃什么| 三个降号是什么调| 肝炎是什么病| 6月21号什么星座| 嘴炮是什么意思| 骶椎腰化什么意思| 6月26号是什么星座| 胃癌早期有什么症状| 晋升是什么意思| 晚上头疼是什么原因| 老舍原名是什么| 依达拉奉注射功效与作用是什么| acc是什么| 为什么狱警离婚率高| 吃太烫的东西有什么坏处| 月子中心需要什么资质| Rm是什么| piv是什么病毒| 纯牛奶可以做什么美食| 陨石有什么作用和功效| 胃强脾弱吃什么中成药| 血虚肝旺有什么症状有哪些| 肾积水是什么原因造成的怎么治疗| 中学校长什么级别| 不怕热是什么体质| 泪囊炎用什么眼药水| 猥琐什么意思| 头发为什么会分叉| 功什么不什么| 痰湿阻滞吃什么中成药| 撸铁什么意思| 水浒传是什么朝代| 什么私语| 耳鸣看什么科| 养鱼为什么养单不养双| 麦高芬是什么意思| 乳房看什么科| 小孩风寒感冒吃什么药| 黄金变黑是什么原因| 脾肺气虚吃什么中成药| 后背长痘痘是什么原因| 荷塘月色是什么菜| 白细胞是什么意思| 什么是肌张力| 金骏眉是什么茶| 梦见眼镜蛇是什么预兆| 海带是什么植物| ck属于什么档次| 知了吃什么食物| b细胞淋巴肿瘤是一种什么病| 紫癜吃什么药| 小限是什么意思| 拉黑便是什么原因| 湖蓝色是什么颜色| 心律失常是什么症状| 灶心土是什么| 红月亮是什么兆头| 为什么有钱人不去植发| 特药是什么意思| 雨像什么| 颅内缺血灶是什么病症| 菲拉格慕属于什么档次| 淋巴结炎挂什么科| 拔火罐对身体有什么好处| 兔死狗烹是什么意思| 什么叫绝对值| 13层楼房有什么说法吗| igg抗体是什么意思| 三伏天是什么意思| 9月1号什么星座| 田七蒸瘦肉有什么功效| 喝什么助眠| lee是什么牌子| 潮热盗汗是什么意思| 鲱鱼是什么鱼| 女人耳垂大厚代表什么| 一什么一笑| praal00是什么型号| 人间蒸发是什么意思| 宫颈hsil是什么意思| 长智齿是什么原因引起的| 黄疸有什么症状| 辣眼睛是什么意思| 开车压到猫有什么预兆| 广州为什么叫花城| 247是什么意思| 耳朵后面长痘痘是什么原因| 淋巴结肿大吃什么食物好| 内分泌紊乱是什么意思| 神经性皮炎吃什么药| 时来运转是什么意思| 公筷是什么意思| 胃溃疡吃什么药好得快| 手心出汗是什么原因| 宝石蓝是什么颜色| 非私营单位是什么| 做梦人死了是什么征兆| 什么沐浴露好用| 扬字五行属什么| gg是什么品牌| 喝黄瓜汁有什么好处| 水瓶座与什么星座最配| 阿司匹林是什么药| 三伏天喝什么汤最好| 三伏天吃什么好| 太阳指什么生肖| 耳石症是什么原因引起的| 1月27日是什么星座| 不思量 自难忘什么意思| 红艳煞什么意思| 慢性宫颈炎吃什么药| 94年是什么命| 芬必得是什么药| 银花有焰万家春是什么生肖| 夕阳什么意思| 打嗝不停是什么病前兆| anca是什么检查| 鼻子经常流鼻涕是什么原因| 什么人靠别人的脑袋生活| 姐姐的女儿叫什么称呼| 波折是什么意思| 胺试验阳性是什么意思| 天池为什么没有鱼| 9月3号是什么日子| 一个叉念什么| 亩产是什么意思| 英五行属什么| 舌苔厚黄是什么原因| 手足口是什么引起的| 洗澡用什么香皂好| 为什么会来月经| 阑尾炎吃什么| 血常规能查出什么病| 心律不齐是什么病| 知柏地黄丸有什么作用| 紫菜吃多了有什么坏处| 轻歌曼舞是什么意思| 6.20是什么星座| 偶尔耳鸣是什么原因| 1234是什么意思| 除了火车什么车最长| 钢琴10级是什么水平| 大利月小利月什么意思| 小苏打有什么作用| 马桶堵了用什么疏通| 5年生存率是什么意思| 过奖是什么意思| 744是什么意思| r车标是什么牌子| max什么意思| 眼冒金星是什么原因| 女人胆固醇高什么原因| 520是什么意思表白| 嗜碱性粒细胞偏低说明什么| 送女生什么礼物比较好| 后背酸疼是什么原因| 孙悟空是什么佛| baron是什么意思| 肚子胀气是什么原因| 阿司匹林肠溶片什么时候吃最好| 章鱼是什么动物| 茶叶杀青是什么意思| 什么是otc| 防晒衣什么颜色最防晒| 百度Jump to content

麓湖A4美术馆迎开馆 以“创造空间”回应未来走向

From Wikipedia, the free encyclopedia
百度   监管部门必须高度重视,真正做好常抓细抓长抓的大文章;消费者也要擦亮眼睛,学会“有态度地消费”;新经济行业也应增强行业自律,维护行业形象。

The Session Initiation Protocol (SIP) is the signaling protocol selected by the 3rd Generation Partnership Project (3GPP)[1][2] to create and control multimedia sessions with multiple participants in the IP Multimedia Subsystem (IMS). It is therefore a key element in the IMS framework.

SIP was developed by the Internet Engineering Task Force (IETF) as a standard for controlling multimedia communication sessions in Internet Protocol (IP) networks. It is characterized by its position in the application layer of the Internet Protocol Suite. Several SIP extensions published in Request for Comments (RFC) protocol recommendations, have been added to the basic protocol for extending its functionality.[3][4][5]

The 3GPP, which is a collaboration between groups of telecommunications associations aimed at developing and maintaining the IMS, stated a series of requirements for SIP[1] to be successfully used in the IMS. Some of them could be addressed by using existing capabilities and extensions in SIP while, in other cases, the 3GPP had to collaborate with the IETF to standardize new SIP extensions[6] to meet the new requirements. The IETF develops SIP on a generic basis, so that the use of extensions is not restricted to the IMS framework.

3GPP requirements for SIP

[edit]

The 3GPP has stated several general requirements for operation of the IMS. These include an efficient use of the radio interface by minimizing the exchange of signaling messages between the mobile terminal and the network, a minimum session setup time by performing tasks prior to session establishment instead of during session establishment, a minimum support required in the terminal, the support for roaming and non-roaming scenarios with terminal mobility management (supported by the access network, not SIP), and support for IPv6 addressing.

Other requirements involve protocol extensions, such as SIP header fields to exchange user or server information, and SIP methods to support new network functionality: requirement for registration, re-registration, de-registration, event notifications, instant messaging or call control primitives with additional capabilities such as call transference.

Other specific requirements are:[1]

  • Quality of service support with policy and charging control, as well as resource negotiation and allocation before alerting the destination user.
  • Identification of users for authentication, authorization and accounting purposes. Security between users and the network and among network nodes is a major issue to be addressed by using mutual authentication mechanisms such as private and public keys and digests, as well as media authorization extensions. It must be also possible to present both the caller and the called party the identities of their counterparts, with the ability to hide this information if required. Anonymity in session establishment and privacy are also important.
  • Protection of SIP signaling with integrity and confidentiality support based on initial authentication and symmetric cryptographic keys; error recovery and verification are also needed.
  • Session release initiated by the network (e.g. in case the user terminal leaves coverage or runs out of credit).
  • Source-routing mechanisms. The routing of SIP messages has its own requirements in the IMS as all terminal originated session setup attempts must transit both the P-CSCF and the S-CSCF so that these call session control functions (CSCFs) servers can properly provide their services. There can be special path requirements for certain messages as well.
  • Interoperation between IMS and the public switched telephone network (PSTN).

Finally, it is also necessary that other protocols and network services such as DHCP or DNS[7] are adapted to work with SIP, for instance for outbound proxy (P-CSCF) location and SIP Uniform Resource Identifier (URI) to IP address resolution, respectively.

Extension negotiation mechanism

[edit]

There is a mechanism[2] in SIP for extension negotiation between user agents (UA) or servers, consisting of three header fields: supported, require and unsupported, which UAs or servers (i.e. user terminals or call session control function (CSCF) in IMS) may use to specify the extensions they understand. When a client initiates a SIP dialog with a server, it states the extensions it requires to be used and also other extensions that are understood (supported), and the server will then send a response with a list of extensions that it requires. If these extensions are not listed in the client's message, the response from the server will be an error response. Likewise, if the server does not support any of the client's required extensions, it will send an error response with a list of its unsupported extensions. This kind of extensions are called option tags, but SIP can also be extended with new methods. In that case, user agents or servers use the Allow header to state which methods they support. To require the use of a particular method in a particular dialog, they must use an option tag associated to that method.

SIP extensions

[edit]

Caller preferences and user agent capabilities

[edit]

These two extensions allow users to specify their preferences about the service the IMS provides.

With the caller preferences extension,[8] the calling party is able to indicate the kind of user agent they want to reach (e.g. whether it is fixed or mobile, a voicemail or a human, personal or for business, which services it is capable to provide, or which methods it supports) and how to search for it, with three header fields: Accept-Contact to describe the desired destination user agents, Reject-Contact to state the user agents to avoid, and Request-Disposition to specify how the request should be handled by servers in the network (i.e. whether or not to redirect and how to search for the user: sequentially or in parallel).

By using the user agent capabilities extension,[9] user agents (terminals) can describe themselves when they register so that others can search for them according to their caller preferences extension headers. For this purpose, they list their capabilities in the Contact header field of the REGISTER message.

Event notification

[edit]

The aim of event notification is to obtain the status of a given resource (e.g. a user, one's voicemail service) and to receive updates of that status when it changes.

Event notification is necessary in the IMS framework to inform about the presence of a user (i.e. "online" or "offline") to others that may be waiting to contact them, or to notify a user and its P-CSCF of its own registration state, so that they know if they are reachable and what public identities they have registered. Moreover, event notification can be used to provide additional services such as voicemail (i.e. to notify that they have new voice messages in their inbox).

To this end, the specific event notification extension[10] defines a framework for event notification in SIP, with two new methods: SUBSCRIBE and NOTIFY, new header fields and response codes and two roles: the subscriber and the notifier. The entity interested in the state information of a resource (the subscriber) sends a SUBSCRIBE message with the Uniform Resource Identifier (URI) of the resource in the request initial line, and the type of event in the Event header. Then the entity in charge of keeping track of the state of the resource (the notifier), receives the SUBSCRIBE request and sends back a NOTIFY message with a subscription-state header as well as the information about the status of the resource in the message body. Whenever the resource state changes, the notifier sends a new NOTIFY message to the subscriber. Each kind of event a subscriber can subscribe to is defined in a new event package. An event package describes a new value for the SUBSCRIBE Event header, as well as a MIME type to carry the event state information in the NOTIFY message.

There is also an allow-events header to indicate event notification capabilities, and the 202 accepted and 489 bad event response codes to indicate if a subscription request has been preliminary accepted or has been turned down because the notifier does not understand the kind of event requested.

In order to make an efficient use of the signaling messages, it is also possible to establish a limited notification rate (not real-time notifications) through a mechanism called event throttling. Moreover, there is also a mechanism for conditional event notification that allows the notifier to decide whether or not to send the complete NOTIFY message depending on if there is something new to notify since last subscription or there is not.

State publication

[edit]

The event notification framework defines how a user agent can subscribe to events about the state of a resource, but it does not specify how that state can be published. The SIP extension for event state publication[11] was defined to allow user agents to publish the state of an event to the entity (notifier) that is responsible for composing the event state and distributing it to the subscribers.

The state publication framework defines a new method: PUBLISH, which is used to request the publication of the state of the resource specified in the request-URI, with reference to the event stated in the Event header, and with the information carried in the message body.

Instant messaging

[edit]

The functionality of sending instant messages to provide a service similar to text messaging is defined in the instant messaging extension.[12] These messages are unrelated to each other (i.e. they do not originate a SIP dialog) and sent through the SIP signaling network, sharing resources with control messages.

This functionality is supported by the new MESSAGE method, which can be used to send an instant message to the resource stated in the request-URI, with the content carried in the message body. This content is defined as a MIME type, being text/plain the most common one.

In order to have an instant messaging session with related messages, the Message Session Relay Protocol (MSRP)[13] is available.

Call transfer

[edit]

The REFER method extension[14] defines a mechanism to request a user agent to contact a resource which is identified by a URI in the Refer-To header field of the request message. A typical use of this mechanism is call transfer: during a call, the participant who sends the REFER message tells the recipient to contact to the user agent identified by the URI in the corresponding header field. The REFER message also implies an event subscription to the result of the operation, so that the sender will know whether or not the recipient could contact the third person.

However, this mechanism is not restricted to call transfer, since the Refer-To header field can be any kind of URI, for instance, an HTTP URI, to require the recipient to visit a web page.

Reliability of provisional responses

[edit]

In the basic SIP specification,[15] only requests and final responses (i.e. 2XX response codes) are transmitted reliably, this is, they are retransmitted by the sender until the acknowledge message arrives (i.e. the corresponding response code to a request, or the ACK request corresponding to a 2XX response code). This mechanism is necessary since SIP can run not only over reliable transport protocols (TCP) that assure that the message is delivered, but also over unreliable ones (UDP) that offer no delivery guarantees, and it is even possible that both kinds of protocols are present in different parts of the transport network.

However, in such an scenario as the IMS framework, it is necessary to extend this reliability to provisional responses to INVITE requests (for session establishment, this is, to start a call). The reliability of provisional responses extension[16] provides a mechanism to confirm that provisional responses such as the 180 Ringing response code, that lets the caller know that the callee is being alerted, are successfully received. To do so, this extension defines a new method: PRACK, which is the request message used to tell the sender of a provisional response that his or her message has been received. This message includes a RACK header field which is a sequence number that matches the RSeq header field of the provisional response that is being acknowledged, and also contains the CSeq number that identifies the corresponding INVITE request. To indicate that the user agent requests or supports reliable provisional responses, the 100rel option tag will be used.

Session description updating

[edit]

The aim of the UPDATE method extension[17] is to allow user agents to provide updated session description information within a dialog, before the final response to the initial INVITE request is generated. This can be used to negotiate and allocate the call resources before the called party is alerted.

Preconditions

[edit]

In the IMS framework, it is required that once the callee is alerted, the chances of a session failure are minimum. An important source of failure is the inability to reserve network resources to support the session, so these resources should be allocated before the phone rings. However, in the IMS, to reserve resources the network needs to know the callee's IP address, port and session parameters and therefore it is necessary that the initial offer/answer exchange to establish a session has started (INVITE request). In basic SIP, this exchange eventually causes the callee to be alerted. To solve this problem, the concept of preconditions[18] was introduced. In this concept the caller states a set of constraints about the session (i.e. codecs and QoS requirements) in the offer, and the callee responds to the offer without establishing the session or alerting the user. This establishment will occur if and only if both the caller and the callee agree that the preconditions are met.

The preconditions SIP extension affects both SIP, with a new option tag (precondition) and defined offer/answer exchanges, and Session Description Protocol (SDP), which is a format used to describe streaming media initialization parameters, carried in the body of SIP messages. The new SDP attributes are meant to describe the current status of the resource reservation, the desired status of the reservation to proceed with session establishment, and the confirmation status, to indicate when the reservation status should be confirmed.

The SDP offer/answer model using PRACK and UPDATE requests

[edit]

In the IMS, the initial session parameter negotiation can be done by using the provisional responses and session description updating extensions, along with SDP in the body of the messages. The first offer, described by means of SDP, can be carried by the INVITE request and will deal with the caller's supported codecs. This request will be answered by the provisional reliable response code 183 Session Progress, that will carry the SDP list of supported codecs by both the caller and the callee. The corresponding PRACK to this provisional answer will be used to select a codec and initiate the QoS negotiation.

The QoS negotiation is supported by the PRACK request, that starts resource reservation in the calling party network, and it is answered by a 2XX response code. Once this response has been sent, the called party has selected the codec too, and starts resource reservation on its side. Subsequent UPDATE requests are sent to inform about the reservation progress, and they are answered by 2XX response codes. In a typical offer/answer exchange,[19] one UPDATE will be sent by the calling party when its reservation is completed, then the called party will respond and eventually finish allocating the resources. It is then, when all the resources for the call are in place, when the caller is alerted.

Identification and charging

[edit]

In the IMS framework it is fundamental to handle user identities for authentication, authorization and accounting purposes. The IMS is meant to provide multimedia services over IP networks, but also needs a mechanism to charge users for it. All this functionality is supported by new special header fields.

P-headers

[edit]

The Private Header Extensions to SIP,[6] also known as P-Headers, are special header fields whose applicability is limited to private networks with a certain topology and characteristics of lower layers' protocols. They were designed specifically to meet the 3GPP requirements because a more general solution was not available.

These header fields are used for a variety of purposes including charging and information about the networks a call traverses:

  • P-Charging-Vector: A collection of charging information, such as the IMS Charging Identity (ICID) value, the address of the SIP proxy that creates the ICID value, and the Inter Operator Identifier (IOI). It may be filled during the establishment of a session or as a standalone transaction outside a dialog.
  • P-Charging-Function-Address: The addresses of the charging functions (functional entities that receive the charging records or events) in the user's home network. It also may be filled during the establishment of a dialog or as a standalone transaction, and informs each proxy involved in a transaction.
  • P-Visited-Network-ID: Identification string of the visited network. It is used during registrations, to indicate to the user's home network which network is providing services to a roaming user, so that the home network is able to accept the registration according to their roaming agreements.
  • P-Access-Network-Info: Information about the access technology (the network providing the connectivity), such as the radio access technology and cell identity. It is used to inform service proxies and the home network, so that they can optimize services or simply so that they can locate the user in a wireless network
  • P-Called-Party-ID: The URI originally indicated in the request-URI of a request generated by the calling user agent. When the request reaches the registrar (S-CSCF) of the called user, the registrar re-writes the request-URI on the first line of the request with the registered contact address (i.e. IP address) of the called user, and stores the replaced request-URI in this header field. In the IMS, a user may be identified by several SIP URIs (address-of-record), for instance, a SIP URI for work and another SIP URI for personal use, and when the registrar replaces the request-URI with the effective contact address, the original request-URI must be stored so that the called party knows to which address-of-record was the invitation sent.
  • P-Associated-URI: Additional URIs that are associated with a user that is registering. It is included in the 200 OK response to a REGISTER request to inform a user which other URIs the service provider has associated with an address-of-record (AOR) URI.

More private headers have been defined for user database accessing:

  • P-User-Database:[20] The address of the user database, this is, the Home Subscriber Server (HSS), that contains the profile of the user that generated a particular request. Although the HSS is a unique master database, it can be distributed into different nodes for reliability and scalability reasons. In this case, a Subscriber location function (SLF) is needed to find the HSS that handles a particular user. When a user request reaches the I-CSCF at the edge of the administrative domain, this entity queries the SLF for the corresponding HSS and then, to prevent the S-CSCF from having to query the SLF again, sends the HSS address to the S-CSCF in the P-User-Database header. Then the S-CSCF will be able to directly query the HSS to get information about the user (e.g. authentication information during a registration).[21]
  • P-Profile-Key:[22] The key to be used to query the user database (HSS) for a profile corresponding to the destination SIP URI of a particular SIP request. It is transmitted among proxies to perform faster database queries: the first proxy finds the key and the others query the database by directly using the key. This is useful when Wildcarded Service Identities are used, this is, Public Service Identities that match a regular expression, because the first query has to resolve the regular expression to find the key.

Asserted identity

[edit]

The private extensions for asserted identity within trusted networks[23] are designed to enable a network of trusted SIP servers to assert the identity of authenticated users, only within an administrative domain with previously agreed policies for generation, transport and usage of this identification information. These extensions also allow users to request privacy so that their identities are not spread outside the trust domain. To indicate so, they must insert the privacy token id into the Privacy header field.[24]

The main functionality is supported by the P-Asserted-Identity extension header. When a proxy server receives a request from an untrusted entity and authenticates the user (i.e. verifies that the user is who he or she says that he or she is), it then inserts this header with the identity that has been authenticated, and then forwards the request as usual. This way, other proxy servers that receive this SIP request within the Trust Domain (i.e. the network of trusted entities with previously agreed security policies) can safely rely on the identity information carried in the P-Asserted-Identity header without the necessity of re-authenticating the user.

The P-Preferred-Identity extension header is also defined, so that a user with several public identities is able to tell the proxy which public identity should be included in the P-Asserted-Identity header when the user is authenticated.

Finally, when privacy is requested, proxies must withhold asserted identity information outside the trusted domain by removing P-Asserted-Identity headers before forwarding user requests to untrusted identities (outside the Trust Domain).

There exist analogous extension headers for handling the identification of services of users,[25] instead of the users themselves. In this case, Uniform Resource Names are used to identify a service (e.g. a voice call, an instant messaging session, an IPTV streaming)[26]

Security mechanisms

[edit]

Access security in the IMS consists of first authenticating and authorizing the user, which is done by the S-CSCF, and then establishing secure connections between the P-CSCF and the user. There are several mechanisms to achieve this, such as:

The security mechanisms agreement extension for SIP[28] was then introduced to provide a secure mechanism for negotiating the security algorithms and parameters to be used by the P-CSCF and the terminal. This extension uses three new header fields to support the negotiation process:

  • First, the terminal adds a security–client header field containing the mechanisms, authentication and encryption algorithms it supports to the REGISTER request.
  • Then, the P-CSCF adds a security-server header field to the response that contains the same information as the client's but with reference to the P-CSCF. In case there are more than one mechanism, they are associated with a priority value.
  • Finally, the user agent sends a new REGISTER request over the just created secure connection with the negotiated parameters, including a security-verify header field that carries the same contents as the previously received security-server header field. This procedure protects the negotiation mechanism from Man-in-the-middle attacks: if an attacker removed the strongest security mechanisms from the Security-Server header field in order to force the terminal to choose weaker security algorithms, then the Security-Verify and Security-Server header fields would not match. The contents of the Security-Verify header field cannot be altered as they are sent through the new established secure association, as long as this association is no breakable by the attacker in real time (i.e. before the P-CSCF discovers the Man-in-the-middle attack in progress.

Media authorization

[edit]

The necessity in the IMS of reserving resources to provide quality of service (QoS) leads to another security issue: admission control and protection against denial-of-service attacks. To obtain transmission resources, the user agent must present an authorization token to the network (i.e. the policy enforcement point, or PEP) . This token will be obtained from its P-CSCF, which may be in charge of QoS policy control or have an interface with the policy control entity in the network (i.e. the policy decision function, or PDF) which originally provides the authorization token.

The private extensions for media authorization[29] link session signaling to the QoS mechanisms applied to media in the network, by defining the mechanisms for obtaining authorization tokens and the P-Media-Authorization header field to carry these tokens from the P-CSCF to the user agent. This extension is only applicable within administrative domains with trust relationships. It was particularly designed for specialized SIP networks like the IMS, and not for the general Internet.

Source-routing mechanisms

[edit]

Source routing is the mechanism that allows the sender of a message to specify partially or completely the route the message traverses. In SIP, the route header field, filled by the sender, supports this functionality by listing a set of proxies the message will visit. In the IMS context, there are certain network entities (i.e. certain CSCFs) that must be traversed by requests from or to a user, so they are to be listed in the Route header field. To allow the sender to discover such entities and populate the route header field, there are mainly two extension header fields: path and service-route.

Path

[edit]

The extension header field for registering non-adjacent contacts[30] provides a Path header field which accumulates and transmits the SIP URIs of the proxies that are situated between a user agent and its registrar as the REGISTER message traverses then. This way, the registrar is able to discover and record the sequence of proxies that must be transited to get back to the user agent.

In the IMS every user agent is served by its P-CSCF, which is discovered by using the Dynamic Host Configuration Protocol or an equivalent mechanism when the user enters the IMS network, and all requests and responses from or to the user agent must traverse this proxy. When the user registers to the home registrar (S-CSCF), the P-CSCF adds its own SIP URI in a Path header field in the REGISTER message, so that the S-CSCF receives and stores this information associated with the contact information of the user. This way, the S-CSCF will forward every request addressed to that user through the corresponding P-CSCF by listing its URI in the route header field.

Service route

[edit]

The extension for service route discovery during registration[31] consists of a Service-Route header field that is used by the registrar in a 2XX response to a REGISTER request to inform the registering user of the entity that must forward every request originated by him or her.

In the IMS, the registrar is the home network's S-CSCF and it is also required that all requests are handled by this entity, so it will include its own SIP URI in the service-route header field. The user will then include this SIP URI in the Route header field of all his or her requests, so that they are forwarded through the home S-CSCF.

Globally routable user agent URIs

[edit]

In the IMS it is possible for a user to have multiple terminals (e.g. a mobile phone, a computer) or application instances (e.g. video telephony, instant messaging, voice mail) that are identified with the same public identity (i.e. SIP URI). Therefore, a mechanism is needed in order to route requests to the desired device or application. That is what a Globally Routable User Agent URI (GRU)[32] is: a URI that identifies a specific user agent instance (i.e. terminal or application instance) and it does it globally (i.e. it is valid to route messages to that user agent from any other user agent on the Internet).

These URIs are constructed by adding the gr parameter to a SIP URI, either to the public SIP URI with a value that identifies the user agent instance, or to a specially created URI that does not reveal the relationship between the GRUU and the user's identity, for privacy purposes. They are commonly obtained during the registration process: the registering user agent sends a Uniform Resource Name (URN) that uniquely identifies that SIP instance, and the registrar (i.e. S-CSCF) builds the GRUU, associates it to the registered identity and SIP instance and sends it back to the user agent in the response. When the S-CSCF receives a request for that GRUU, it will be able to route the request to the registered SIP instance.

Signaling compression

[edit]

The efficient use of network resources, which may include a radio interface or other low-bandwidth access, is essential in the IMS in order to provide the user with an acceptable experience in terms of latency. To achieve this goal, SIP messages can be compressed using the mechanism known as SigComp[33] (signaling compression).

Compression algorithms perform this operation by substituting repeated words in the message by its position in a dictionary where all these words only appear once. In a first approach, this dictionary may be built for each message by the compressor and sent to the decompressor along with the message itself. However, as many words are repeated in different messages, the extended operations for SigComp[34] define a way to use a shared dictionary among subsequent messages. Moreover, in order to speed up the process of building a dictionary along subsequent messages and provide high compression ratios since the first INVITE message, SIP provides a static SIP/SDP dictionary [35] which is already built with common SIP and SDP terms.

There is a mechanism[36] to indicate that a SIP message is desired to be compressed. This mechanism defines the comp=sigcomp parameter for SIP URIs, which signals that the SIP entity identified by the URI supports SigComp and is willing to receive compressed messages. When used in request-URIs, it indicates that the request is to be compressed, while in Via header fields it signals that the subsequent response is to be compressed.

Content Indirection

[edit]

In order to obtain even shorter SIP messages and make a very efficient use of the resources, the content indirection extension[37] makes it possible to replace a MIME body part of the message with an external reference, typically an HTTP URI. This way the recipient of the message can decide whether or not to follow the reference to fetch the resource, depending on the bandwidth available.

NAT traversal

[edit]

Network address translation (NAT) makes it impossible for a terminal to be reached from outside its private network, since it uses a private address that is mapped to a public one when packets originated by the terminal cross the NAT. Therefore, NAT traversal mechanisms are needed for both the signaling plane and the media plane.

Internet Engineering Task Force's RFC 6314[38] summarizes and unifies different methods to achieve this, such as symmetric response routing and client-initiated connections for SIP signaling, and the use of STUN, TURN and ICE, which combines both previous ones, for media streams

Internet Protocol version 6 compatibility

[edit]

Internet Engineering Task Force's RFC 6157[39] describes the necessary mechanisms to guarantee that SIP works successfully between both Internet Protocol versions during the transition to IPv6. While SIP signaling messages can be transmitted through heterogeneous IPv4/IPv6 networks as long as proxy servers and DNS entries are properly configured to relay messages across both networks according to these recommendations, user agents will need to implement extensions so that they can directly exchange media streams. These extensions are related to the Session Description Protocol offer/answer initial exchange, that will be used to gather the IPv4 and IPv6 addresses of both ends so that they can establish a direct communication.

Interworking with other technologies

[edit]

Apart from all the explained extensions to SIP that make it possible for the IMS to work successfully, it is also necessary that the IMS framework interworks and exchanges services with existing network infrastructures, mainly the Public switched telephone network (PSTN).

There are several standards that address this requirements, such as the following two for services interworking between the PSTN and the Internet (i.e. the IMS network):

And also for PSTN-SIP gateways to support calls with one end in each network:

  • Session Initiation Protocol for Telephones (SIP-T),[42] that describes the practices and uses of these gateways.
  • ISDN User Part (ISUP) to Session Initiation Protocol (SIP) Mapping,[43] which makes it possible to translate SIP signaling messages into ISUP messages of the Signaling System No. 7 (SS7) which is used in the PSTN, and vice versa.

Moreover, the SIP INFO method extension is designed to carry user information between terminals without affecting the signaling dialog and can be used to transport the dual-tone multi-frequency signaling to provide telephone keypad function for users.[44]

See also

[edit]

References

[edit]
  1. ^ a b c Garcia-Martin, M. (May 2005). Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC4083. RFC 4083. Retrieved November 29, 2014.
  2. ^ a b Camarillo, Gonzalo; García-Martín, Miguel A. (November 4, 2008). The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds (3 ed.). John Wiley & Sons. pp. 55–336. ISBN 978-0-470-51662-1. Archived from the original on November 30, 2014. Retrieved 15 November 2014.
  3. ^ Poikselk?, Miikka; Mayer, Georg; Khartabil, Hisham; Niemi, Aki (March 10, 2006). The IMS: IP multimedia concepts and services (2 ed.). John Wiley & Sons. pp. 320–331. ISBN 978-0-470-01906-1. Archived from the original on November 15, 2014. Retrieved 15 November 2014.
  4. ^ Red Hat. "8.6. SIP AND IMS EXTENSIONS". redhat.com. Retrieved 15 November 2014.
  5. ^ Systems & Networks Training. "SIP in IMS". snt.co.uk. Archived from the original on 28 March 2015. Retrieved 15 November 2014.
  6. ^ a b Jesske, R.; Drage, K.; Holmberg, C. (July 2014). Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3GPP. IETF. doi:10.17487/RFC7315. RFC 7315. Retrieved November 15, 2014.
  7. ^ Rosenberg, J.; Schulzrinne, H. (June 2002). Session Initiation Protocol (SIP): Locating SIP Servers. IETF. doi:10.17487/RFC3263. RFC 3263. Retrieved December 1, 2014.
  8. ^ Rosenberg, J.; Schulzrinne, H.; Kyzivat, P. (August 2004). Caller Preferences for the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3841. RFC 3841. Retrieved December 1, 2014.
  9. ^ Rosenberg, J.; Schulzrinne, H.; Kyzivat, P. (August 2004). Indicating User Agent Capabilities in the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3840. RFC 3840. Retrieved December 1, 2014.
  10. ^ Roach, A. (June 2002). Session Initiation Protocol (SIP)-Specific Event Notification. IETF. doi:10.17487/RFC3265. RFC 3265. Retrieved December 1, 2014.
  11. ^ Niemi, A. (October 2004). Session Initiation Protocol (SIP) Extension for Event State Publication. IETF. doi:10.17487/RFC3903. RFC 3903. Retrieved December 2, 2014.
  12. ^ Campbell, B.; Ed., Rosenberg; J., Schulzrinne; H., Huitema; C., and; D., Gurle (December 2002). Session Initiation Protocol (SIP) Extension for Instant Messaging. IETF. doi:10.17487/RFC3428. RFC 3428. Retrieved December 2, 2014.
  13. ^ Campbell, B.; Ed., Mahy; R., Ed.; Jennings, C. (September 2007). The Message Session Relay Protocol (MSRP). IETF. doi:10.17487/RFC4975. RFC 4975. Retrieved December 2, 2014.
  14. ^ Sparks, R. (April 2003). The Session Initiation Protocol (SIP) Refer Method. IETF. doi:10.17487/RFC3515. RFC 3515. Retrieved December 2, 2014.
  15. ^ a b Rosenberg, J.; et al. (June 2002). SIP: Session Initiation Protocol. IETF. doi:10.17487/RFC3261. RFC 3261. Retrieved November 15, 2014.
  16. ^ Rosenberg, J.; Schulzrinne, H. (June 2002). Reliability of Provisional Responses in Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3262. RFC 3262. Retrieved December 2, 2014.
  17. ^ Rosenberg, J. (October 2002). The Session Initiation Protocol (SIP) UPDATE Method. IETF. doi:10.17487/RFC3311. RFC 3311. Retrieved December 2, 2014.
  18. ^ Camarillo, G.; Ed., Marshall; W., Ed.; Rosenberg, J. (October 2002). Integration of Resource Management and Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3312. RFC 3312. Retrieved December 3, 2014.
  19. ^ EvenHelix. "IMS to IMS call" (PDF). eventhelix.com/. Archived from the original (PDF) on 22 January 2015. Retrieved 3 December 2014.
  20. ^ Camarillo, G.; Blanco, G. (April 2006). The Session Initiation Protocol (SIP) P-User-Database Private-Header (P-Header). IETF. doi:10.17487/RFC4457. RFC 4457. Retrieved December 5, 2014.
  21. ^ EvenHelix. "IMS registration" (PDF). eventhelix.com/. Retrieved 5 December 2014.
  22. ^ Camarillo, G.; Blanco, G. (August 2007). The Session Initiation Protocol (SIP) P-Profile-Key Private Header (P-Header). IETF. doi:10.17487/RFC5002. RFC 5002. Retrieved December 5, 2014.
  23. ^ Jennings, C.; Peterson, J.; Watson, M. (November 2002). Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks. IETF. doi:10.17487/RFC3325. RFC 3325. Retrieved December 3, 2014.
  24. ^ Peterson, J. (November 2002). A Privacy Mechanism for the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3323. RFC 3323. Retrieved December 3, 2014.
  25. ^ Drage, K. (November 2010). A Session Initiation Protocol (SIP) Extension for the Identification of Services. IETF. doi:10.17487/RFC6050. RFC 6050. Retrieved December 5, 2014.
  26. ^ Rosenberg, J. (June 2010). Identification of Communications Services in the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC5897. RFC 5897. Retrieved December 5, 2014.
  27. ^ Niemi, A.; Arkko, J.; Torvinen, V. (September 2002). Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA). IETF. doi:10.17487/RFC3310. RFC 3310. Retrieved December 5, 2014.
  28. ^ Arkko, J.; Torvinen, V.; Camarillo, G.; Niemi, A.; Haukka, T. (January 2003). Security Mechanism Agreement for the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3329. RFC 3329. Retrieved December 5, 2014.
  29. ^ Marshall, W. (January 2003). Private Session Initiation Protocol (SIP) Extensions for Media Authorization. IETF. doi:10.17487/RFC3313. RFC 3313. Retrieved December 5, 2014.
  30. ^ Willis, D.; Hoeneisen, B. (December 2002). Session Initiation Protocol (SIP) Extension Header Field for Registering Non-Adjacent Contacts. IETF. doi:10.17487/RFC3327. RFC 3327. Retrieved December 5, 2014.
  31. ^ Willis, D.; Hoeneisen, B. (October 2003). Session Initiation Protocol (SIP) Extension Header Field for Service Route Discovery During Registration. IETF. doi:10.17487/RFC3608. RFC 3608. Retrieved December 5, 2014.
  32. ^ Rosenberg, J. (October 2009). Obtaining and Using Globally Routable User Agent URIs (GRUUs) in the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC5627. RFC 5627. Retrieved December 5, 2014.
  33. ^ Price, R.; Bormann, C.; Christoffersson, J.; Hannu, H.; Liu, Z.; Rosenberg, J. (January 2003). Signaling Compression (SigComp). IETF. doi:10.17487/RFC3320. RFC 3320. Retrieved December 4, 2014.
  34. ^ Hannu, H.; Christoffersson, J.; Forsgren, S.; Leung, K.-C.; Liu, Z.; Price, R. (January 2003). Signaling Compression (SigComp) - Extended Operations. IETF. doi:10.17487/RFC3321. RFC 3321. Retrieved December 4, 2014.
  35. ^ Garcia-Martin, M.; Bormann, C.; Ott, J.; Price, R.; Roach, A. (February 2003). The Session Initiation Protocol (SIP) and Session Description Protocol (SDP) Static Dictionary for Signaling Compression (SigComp). IETF. doi:10.17487/RFC3485. RFC 3485. Retrieved December 4, 2014.
  36. ^ Camarillo, G. (February 2003). Compressing the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC3486. RFC 3486. Retrieved December 4, 2014.
  37. ^ Burger, E. (May 2006). A Mechanism for Content Indirection in Session Initiation Protocol (SIP) Messages. IETF. doi:10.17487/RFC4483. RFC 4483. Retrieved December 4, 2014.
  38. ^ Boulton, C.; Rosenberg, J.; Camarillo, G.; Audet, F. (July 2011). NAT Traversal Practices for Client-Server SIP. IETF. doi:10.17487/RFC6314. RFC 6314. Retrieved December 5, 2014.
  39. ^ Camarillo, G.; El, Malki; K., and; V., Gurbani (April 2011). IPv6 Transition in the Session Initiation Protocol (SIP). IETF. doi:10.17487/RFC6157. RFC 6157. Retrieved December 5, 2014.
  40. ^ Petrack, S.; Conroy, L. (June 2000). The PINT Service Protocol: Extensions to SIP and SDP for IP Access to Telephone Call Services. IETF. doi:10.17487/RFC2848. RFC 2848. Retrieved December 5, 2014.
  41. ^ Gurbani, V.; Ed., Brusilovsky; A., Faynberg; I., Gato; J., Lu; H., and; M., Unmehopa (October 2004). The SPIRITS (Services in PSTN requesting Internet Services) Protocol. IETF. doi:10.17487/RFC3910. RFC 3910. Retrieved December 5, 2014.
  42. ^ Vemuri, A.; Peterson, J. (September 2002). Session Initiation Protocol for Telephones (SIP-T): Context and Architectures. IETF. doi:10.17487/RFC3372. RFC 3372. Retrieved December 5, 2014.
  43. ^ Camarillo, G.; Roach, A.; Peterson, J.; Ong, L. (December 2002). Integrated Services Digital Network (ISDN) User Part (ISUP) to Session Initiation Protocol (SIP) Mapping. IETF. doi:10.17487/RFC3398. RFC 3398. Retrieved December 5, 2014.
  44. ^ Holmberg, C.; Burger, E.; Kaplan, H. (January 2011). Session Initiation Protocol (SIP) INFO Method and Package Framework. IETF. doi:10.17487/RFC6086. RFC 6086. Retrieved December 5, 2014.

Books

[edit]
[edit]
未必是什么意思 营业执照什么时候年审 中华田园犬为什么禁养 月经提前了10天是什么原因 什么是脂蛋白a
钾在人体中起什么作用 pigeon是什么牌子自行车 小孩包皮挂什么科 cr值是什么 7月27日什么星座
眼角痒用什么眼药水 蛛网膜囊肿挂什么科 爱华仕是什么档次 什么是碳酸饮料 正负得什么
事不过三是什么意思 招待是什么意思 香油是什么油 痤疮用什么药膏最有效 苹果像什么
b超和彩超有什么区别hcv7jop7ns3r.cn 50而知天命什么意思bjcbxg.com 幼稚细胞是什么意思jinxinzhichuang.com 女性安全期是什么时候hcv8jop8ns9r.cn 蜜蜂为什么会蜇人xinmaowt.com
谷丙转氨酶高是什么原因hcv9jop6ns2r.cn bp是什么意思医学上面hcv8jop2ns6r.cn 感冒不能吃什么zsyouku.com 安陵容为什么恨甄嬛hcv8jop1ns5r.cn 八字中的印是什么意思zhongyiyatai.com
怀孕16周要做什么检查adwl56.com 脑梗什么不能吃hcv9jop2ns4r.cn 羡慕的意思是什么hcv7jop9ns2r.cn 兄长是什么意思hcv9jop0ns5r.cn 农历正月是什么星座hcv8jop5ns5r.cn
洋酒是什么酒naasee.com 陪跑什么意思hcv7jop6ns0r.cn 什么是蒙氏教育hcv9jop0ns3r.cn 什么烟好抽hcv7jop9ns8r.cn 今天开什么奖hcv9jop2ns9r.cn
百度