IMS core network architecture

Source: Internet
Author: User
Document directory
  • Application plane
  • Control Plane
  • User plane

The IP-Multimedia Subsystem (IMS) defines the functional architecture for a managed IP-based network. it aims to provide a means for carriers to create an open, standards-based network that delivers integrated multimedia services to increase revenue, while
Also indexing network CAPEX and OPEX.

IMS was originally designed for third-generation mobile phones, but it has already been extended to handle access from WIFI networks, and is continuing to be extended into an access-independent platform for service delivery, including broadband fixed-line
Access. It promises to provide seamless roaming between mobile, public WiFi and private networks for a wide range of services and devices.

The IMS architecture has been designed to enable operators to provide a wide range of real-time, packet-based services and to track their use in a way that allows both traditional time-based charging as well as packet and service-based charging. it has become
Increasingly popular both with wireline and wireless service providers as it is designed to increase carrier revenues, deliver integrated multimedia services, and create an open, standards-based network.

IMS provides a wide range of session border control, including call access control, reachability and security. It also provides a framework for the deployment of both basic calling services and enhanced services, including

  • Multimedia Messaging
  • Web Integration
  • Presence-based services
  • Push-to-talk.

At the same time, it draws on the traditional telecommunications experience

  • Guaranteed QoS
  • Flexible charging mechanisms (time-based, call-collect, premium rates)
  • Lawful intercept legislation compliance.

Network operators also hope that IMS will cut their CAPEX and OPEX through the use of a converged IP backbone and the open IMS architecture.

  • The IMS Architecture defines extends common components (for example, call control and configuration storage) So less development work is required to create a new service as this existing infrastructure can be reused.
  • The use of standardized interfaces shocould increase competition between suppliers; preventing operators from being locked into a single supplier's proprietary interfaces.

As a result, IMS shocould enable new services to be rolled out more quickly and cheaply, compared with the traditional monolithic Design of telephony services.

IMS Architecture

The dimo-below shows the IP multimedia subsystem architecture.

 

 

 

IMS decomposes the networking infrastructure into separate functions with standardized interfaces between them. each interface is specified as a "reference point", which defines both the Protocol over the interface and the functions between which it operates.
The standards do not mandate which functions shoshould be co-located, as this depends on the scale of the application, and a single device may contain several functions.

The 3GPP architecture is split into three main planes or layers, each of which is described by a number of equivalent names: service or application plane, control or signaling plane, and user or transport plane.

Application plane

The application plane provides an infrastructure for the provision and management of services, and defines standard interfaces to common functionality including

  • Configuration storage, identity management, user status (such as presence and location), which is held by the home subscriber server (HSS)
  • Billing services, provided by a charging gateway function (CGF)
  • Control of voice and video calland messaging, provided by the control plane.
Control Plane

The control plane sits between the application and transport planes. It routes the call signaling, tells the transport plane what traffic to allow, and generates billing information for the use of the network.

At the core of this plane is the call session control function (cscf), which comprises the following functions.

  • The proxy-cscf (P-CSCF) is the first point of contact for users with the IMS. the P-CSCF is responsible for security of the messages between the network and the user and allocating resources for the Media Flows.
  • The interrogating-cscf (I-CSCF) is the first point of contact from peered networks. the I-CSCF is responsible for querying the HSS to determine the S-CSCF for a user and may also hide the operator's topology from peer networks (topology hiding inter-network
    Gateway, or thig ).
  • The serving-cscf (S-CSCF) is the central brain. the S-CSCF is responsible for processing registrations to record the location of each user, user authentication, and call processing (including routing of callto applications ). the operation of the S-CSCF
    Is controlled by policy stored in the HSS.

This distributed architecture provides an extremely flexible and scalable solution. For example, any of the cscf functions can generate billing information for each operation.

The control plane also controls user plane traffic through the resource and Admission Control Subsystem (RACs ). this consists of the Policy demo-function (PDF), which implements local policy on resource usage, for example to prevent overload of Particle
Access Links, and access-RAC function (A-RACF), which controls QoS within the access network.

User plane

The user plane provides a core QoS-enabled IPv6 network with access from user equipment (UE) over mobile, WiFi and broadband networks. this infrastructure is designed to provide a wide range of IP Multimedia Server-based and P2P services.

Access into the core network is through border provided ways (ggsn/PDG/BAS). These enforce policy provided by the IMS core, controlling traffic flows between the access and core networks.

Within the user plane

  • The interconnect border control function (I-BCF) controls transport level security and tells the RACs what resources are required for a call
  • The I-BGF, A-BGF border gateway functions provide media relay for hiding endpoint addresses with managed pinholes to prevent bandwidth theft, and implement napt and NAT/firewall traversal for media flo

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.