Professional Documents
Culture Documents
VoLTE Initial Procedures (MPI0126-000-010)
VoLTE Initial Procedures (MPI0126-000-010)
VoLTE Initial Procedures (MPI0126-000-010)
Reference Document
www.mpirical.com
VoLTE Initial Procedures
Reference Document
Mpirical classes have been developed in accordance with the technical specifications
published by the 3GPP. As such the 3GPP have granted Mpirical Limited the right to use the
3GPP logo to identify specifications, compliant products and services.
All rights reserved. No part of this book or accompanying software may be reproduced or
transmitted in any form by any means, electronic, mechanical, photocopying, recording, or
otherwise without the prior written consent of the publisher. Although every precaution has
been taken in the preparation of this book the publisher assumes no responsibility for errors
and omissions. Nor is any liability assumed for damages resulting from the use of the
information contained within.
Contents
IMS Identities......................................................................................................... 1
1.1 Private User Identities ................................................................................... 1
1.2 Public User Identities .................................................................................... 1
1.3 USIM Derived Temporary Identities .............................................................. 3
1.4 Public Service Identity ................................................................................... 4
IMS Registration Analysis...................................................................................... 5
2.1 LTE Network Specifics .................................................................................. 5
2.2 IMS Network Specifics .................................................................................. 7
IMS Registration Analysis – Initial Registration ..................................................... 7
3.1 Initial Registration Request (UE to P-CSCF) ................................................ 7
3.2 Forwarding the REGISTER (P-CSCF to I-CSCF) ......................................... 8
3.3 S-CSCF Selection ......................................................................................... 8
IMS Authentication and Key Agreement.............................................................. 10
4.1 Authentication Vector Acquisition ................................................................ 10
4.2 Authentication Challenge ............................................................................ 12
Reregistration and Subscriber Profile Acquisition ............................................... 13
5.1 Second Register .......................................................................................... 13
5.2 Authentication and Subscriber Profile Acquisition ....................................... 14
Registration Acceptance ..................................................................................... 15
6.1 Third Party Registration .............................................................................. 16
Registration Event Subscription .......................................................................... 16
Service Configuration (Ut Interface) .................................................................... 17
Figures
IMS Identities
1.1 Private User Identities
VoLTE subscribers are allocated a private identity by their home network
service provider; this is used in the Registration, Authorization, and
Accounting processes employed by the IMS. The private identity takes the
format of a NAI (Network Access Identifier), which identifies both the
subscriber and their home network. This NAI will often include a
representation of the IMSI (International Mobile Subscriber Identity).
The private identity of the user is stored in the HSS (Home Subscriber Server)
and the ISIM (IMS Subscriber Identity Module), or if the mobile does not
contain an ISIM, then the private identity may be derived from the IMSI
parameters held on the USIM (Universal Subscriber Identity Module), if
available. If the device contains neither an ISIM or a USIM ie a non-3GPP
device, IMC (IMS Credentials) will be used. This is effectively a generic term
for whichever storage mechanism the device uses for any IMS security data
and functions that are required for IMS access.
Figure 1 shows an example of a VoLTE Private Identity, which includes the
IMSI as the subscriber identifier.
Derived from
ISIM IMC
USIM Credentials
Figure 2 outlines a selection of key features associated with the IMS Private
Identity.
a Tel URI is used, it must be converted to a SIP URI as appropriate. This can
be achieved using the IETF ENUM (e164 to SIP URI Mapping) system.
VoLTE subscribers will have at least two Public IDs:
A SIP URI which contains the MSISDN of the subscriber.
A Tel URI which also contains the MSISDN of the subscriber.
Additional Public IDs are permissible and can be in alternative formats
such as alpha characters eg sip:johnsmith@mpiricalvolte.com.
Public
sip:+447872718782 @mpiricalvolte.com;user=phone
Identity
VoLTE Service
Public
tel:+447872718782
Identity
A selection of key points associated with IMS Public Identities are outlined in
Figure 4.
IMPUs can be
Shortened to IMPUs are not
part of Implicit
IMPU authenticated
Registration sets
IMPU can be
IMPU could be a
used for SIP
tel: URI
routing
Implicit Registration
USIM based registration necessitates the use of Implicit Registration, since
the Temporary Public ID derived from the USIM is just that; temporary. As
such, the mobile needs to be supplied with the correct Public IDs that it must
use once registration is complete.
Implicit registration uses the concept of an Implicitly Registered ID Set. These
sets are essentially groups of public identities which will all be registered at
the same time if and when a SIP REGISTER containing any of the public
identities in the set is sent to the IMS. In other words, you only need to
register one public address and in doing so, every other public address which
shares the same Implicitly Registered ID Set will also be registered. This
process is outlined in Figure 7:
Therefore, if the service provider wishes to use temporary IDs, the HSS must
contain an Implicitly Registered ID Set which includes the temporary Public
ID, plus the real public IDs that the subscriber will eventually need to use
(once registered, the temporary ID will typically not be used for any other
procedures).
The SIP P-Associated-URI header field within the 200OK to the REGISTER
will contain a list of successfully registered Public IDs.
PSIs are typically in the form of a SIP URI or TEL URI, as shown in Figure 8.
MME
Attach Procedure
PDN
Internet IMS APN
Initial Attach Connectivity
Connectivity Connectivity
Request
During this separate PDN connection procedure, the mobile will be supplied
with the P-CSCF IP address, which sits as the payload of PCO (Protocol
Configuration Options) within the “Activate Default EPS Bearer Request" NAS
message (specifically the container identified as “P-CSCF IPv4/IPv6
Address”). Consequently, when the device is eventually ready to conduct the
IMS registration, it knows to which IP address it must send the SIP
REGISTER.
Connectivity to the HOS APN can allow the mobile to configure its services
utilizing XCAP (XML Configuration Access Protocol). For example, this would
allow the subscriber to configure their VoLTE supplementary services or
contacts on their social presence list. See Figure 32 and Figure 34 for further
information.
Figure 13 summarizes the potential LTE connectivity which could be in place
following the LTE initial procedures.
UAA
REGISTER
MAR
MAA
401 Unauthorized
REGISTER
UAR
UAA
REGISTER
SAR
SAA
200OK
Reregistration and
Registration Registration
Initial Registration Subscriber Profile
Security Acceptance
Acquisition
1
3GPP TS 24.173 - IMS multimedia telephony communication service and supplementary services
2
3GPP TS 24.341 - Support of SMS over IP networks
Public User Identity - this will be used by the HSS to identify the service
profile that the user wishes to use.
Private User Identity - this will be in the format of an NAI (Network
Access Identifier). It associates a user with their subscription records
as well as authentication keys that will be used in the subsequent
authentication process.
Visited Network Identity - this variable will be checked by the HSS to
ensure the subscriber is entitled to roam into the visited network.
Type of Authorization - this will indicate the type of signalling that
prompted the interaction with the HSS. This may include Registration,
De-Registration or Registration and Capabilities. The latter will be used
if the I-CSCF requires the capabilities of the S-CSCF. This will normally
be invoked if the I-CSCF has lost dialog with the S-CSCF and is
requesting an alternative from the HSS.
If the UAR is accepted and the Registration is an Initial Registration, as in this
case, the HSS will set the result code to Diameter_First_Registration and
return a list of S-CSCF capabilities to the I-CSCF. Note that the Server
Capabilities AVP in the UAA of Figure 18 is populated with information based
on the service profile for the subscriber (the Private ID is supplied in the UAR
so that the HSS can access the correct service profile).
Once the I-CSCF knows which server capabilities the chosen S-CSCF must
support, it will allocate a S-CSCF. To achieve this, the I-CSCF must already
know which S-CSCFs in the network have which capabilities. This information
is preconfigured by the service provider during network rollout. Introduction of
additional S-CSCFs will mean that the I-CSCFs must be updated with their
capability information.
Certain additional criteria may also be supplied to the I-CSCF which can
influence the S-CSCF selection decision. This is show in Figure 19.
IK
AMF
f1 f2 f3 f4 f5 xor
SQN
UAA
REGISTER
MAR
MAA
401 Unauthorized
REGISTER
UAR
UAA
REGISTER
SAR
SAA
200OK
Once the I-CSCF acquires the identity of the S-CSCF, it can route the SIP
REGISTER towards it.
The service profile must be acquired from the HSS before the S-CSCF
responds to the mobile. This is achieved through the SAR (Server Assignment
Request) and SAA (Server Assignment Answer) message exchange.
Service Profile
Registration in the IMS is not just about binding a user's public ID to a contact
address. One of the fundamental aims of registration is to ensure that a user's
service profile(s) is downloaded to the S-CSCF in order to ensure that future
requests for services will be correctly handled. As such, each public user ID
that a user has must be associated with a service profile.
The service profile will contain the Core Network Service Authorization
parameters, which in turn contain media profiles and capabilities of the user.
Initial Filter Criteria (termed ifc) are also included. This contains information
regarding the AS (Application Server) associated with the service profile and a
list of trigger points that, if the criteria are met, will initiate a dialog with the
referenced AS.
Figure 28 shows the typical architecture of a service profile, showing the
relationship between the public identity and the authorization parameters in
terms of media profiles and filter criteria.
Service Profile
Initial Filter Criteria are based on the information presented in the header of
the SIP messages and can include:
URI - this will indicate the type of user or service the user is wishing to
establish a session with.
Methods - this indicates the service that the user wishes to solicit. This
may include options such as instant messaging, call forwarding or
conference bridging.
Headers - these provide more specific details of the service required.
Session Description - this describes the media bearers etc that are
requested. This information within the profile may be used to influence
policy and charging control at the P-CSCF (Proxy Call Session Control
Function) and the negotiation of QoS (Quality of Service) at the bearer
level.
Downloading of Filter Criteria as part of the Service Profile download from the
HSS is a crucial part of the registration process. In subsequent requests for
services from the subscriber, it is the Filter Criteria which inform the S-CSCF
which AS to use to invoke the desired service.
It should be noted however that a typical registration procedure may not
include the subscriber profile in the payload of the SAA message. This is
usually due to the fact that all subscribers receive the same “default”
subscriber profile which is preconfigured in the S-CSCF.
Registration Acceptance
Once the service profiles for the subscriber have been downloaded to the S-
CSCF, the S-CSCF will be configured to handle future service requests. At
this point, the S-CSCF will return a 200OK, denoting a successful registration.
There are two key elements of the 200OK that the S-CSCF must include
within the 200OK:
Service Route – this will contain the URI of the S-CSCF and is used for
future session establishment procedures. In particular, the contents of
this field will be placed in the Route: header of a service request to
ensure that the request is sent to the S-CSCF to which the subscriber
device is currently registered.
P-Associated URI – if implicit registration is in use, this header field will
list the IMPUs that have additionally been registered as part of this one
registration procedure. This is particularly relevant when a temporary
Public ID has been used for registration, since this field will contain the
actual Public IDs the device must use for session establishment.
Service profiles ,
including supporting
HSS ASs, sent in SAA
AS
REGISTER
S AS
CSCF
REGISTER
Domain 1
S
CSCF
IMS Application
Subscriber Server 1
SUBSCRIBE
SUBSCRIBE
To: IMSSubscriber 1@domain 1
From :IMSSubscriber 1@domain1 To: IMSSubscriber1@domain 1
Event : reg From:appserver 1@domain 1
Event: reg
200 OK
200 OK
NOTIFY NOTIFY
200OK 200OK
Network
Initiated
Deregistration
NOTIFY NOTIFY
As can be seen in Figure 31, the process begins with a normal registration
procedure. Assuming this is successful, the IMS terminal will then generate a
SUBSCRIBE method, which includes the Event: header field being set to reg.
On receipt of the SUBSCRIBE, the S-CSCF will NOTIFY the terminal as to
the current registration status. The body of this NOTIFY will contain an XML
document, in which the registration state is set to "active".
As shown in Figure 31, users are not the only entities that can subscribe to a
registration event. Application Servers will also typically subscribe, since they
too need to be aware of whether a user is registered with the system. The
principle of operation is still the same, although the From: fields will obviously
differ.
If at any point the network initiates a deregistration, any watchers (in this case
the IMS terminal and an application server) will be notified. This time, the
registration state will be set to "terminated".
In order to amend XML based information using XCAP, XML sub-trees and
element attributes are mapped to HTTP URIs. Therefore, these components
can be directly accessed and ultimately manipulated via HTTP. Due to the
security risks associated with configuration data manipulation, it is possible
that authentication is involved in the configuration process.
Each application that makes use of XCAP specifies an application usage. This
application usage defines the XML schema for the data used by the
application, along with other key pieces of information. Application usages
designed for general use on the Internet are registered with the IANA, which
may mean that IMS orientated application usages are not registered (since
they are not designed for general Internet use). Figure 34 shows a selection
of application usages, which are identified with an AUID (Application Unique
ID).
3
RFC 4825 - The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
Glossary
Contact Us
Tel: +44 (0) 1524 844669
Email: enquiries@mpirical.com
www.mpirical.com