You are on page 1of 62

MEE10:08

ANALYSIS OF IP MULTIMEDIA
SUBSYSTEM
FOR 3G NETWORKS
BY

Mohammad Rezaul Hossain Morshed


Md. Humayun Kabir

A Thesis
Presented in partial fulfillment of the requirements for the degree of
Master of Science in Electrical Engineering with specialization in
Telecommunication

Blekinge Institute of Technology


December 2009

Blekinge Institute of Technology


School of Engineering
Department of Telecommunication Systems
Supervisor: Alexandru Popescu

ThesisAbstract

The IP Multimedia Subsystem is seen as the promising solution for the next
generation multimedia communication. The IP Multimedia Subsystem will make
Internet technologies almost anywhere, anytime and on any device such as email,
web, instant messaging, presence and videoconferencing. Presence is one of the
most important basic services in IMS. It is the service that allows a user to be
informed about the reachability, availability and willingness to communicate with
other user. Push to talk over Cellular (PoC) is one more service in IMS that allows
users to engage in immediate communication with one or more users. Instant
Messaging (IM) is the service that allows a user to send some content to another
userinnearrealtime.

In this thesis work, we have discussed overall IMS architecture and identity the
majorissuestoimprovetheexistingprotocolsinIMSforbettersystemperformance.
Our work is centered on Presence service, Push to talk over Cellular, Instant
MessagingandIMSsessionsetup.Inthisthesisthreepossiblesessionestablishment
scenarios in a mobile environment is compared by using an analytical model. The
otherproblemareasinoptimizingpresenceservice,dimensioningaPoCserviceand
analyzingservicerateofIMrelayextensionsinIMSareidentified.


Acknowledgement

We would like to express our immerse gratitude to our supervisor Alexandru


Popescuforhisguidanceandencouragementtowardsthecompletionofourthesis
work.Wewouldalsoliketothankourparentsfortheirsupportandprayersandour
friendswhohavecontributedonewayortheothertothesuccessofthiswork.God
blessyouall.

ii

TableofContents

ThesisAbstract............................................................................................................................i
Acknowledgement......................................................................................................................ii
ListofFigures..............................................................................................................................v
Chapter1...................................................................................................................................1
1.1 Background......................................................................................................................1
1.2 OverviewofIMS..............................................................................................................2
1.3MotivationfortheuseofIMS.........................................................................................2
1.4ProtocolsusedinIMS......................................................................................................3
1.5QoSsupportinIMS..........................................................................................................5
1.6ThesisMotivation............................................................................................................6
1.7ThesisOutline.................................................................................................................7
Chapter2...................................................................................................................................8
2.1Introduction......................................................................................................................8
2.2IMSArchitectureDesign..................................................................................................8
2.3IMSandSIP....................................................................................................................13
2.4SIPandQualityofService..............................................................................................18
Chapter3.................................................................................................................................19
3.1Introduction...................................................................................................................19
3.2TheCoupleModel.........................................................................................................23
3.3TheAssociatedModelusingonepolicyserver.............................................................25
3.4TheAssociatedModelusingtwopolicyserver.............................................................26
3.5TheNonAssociatedModel...........................................................................................28
3.6Conclusions....................................................................................................................29
Chapter4.................................................................................................................................30
4.1Introduction...................................................................................................................30
4.2SIPpresencearchitecture..............................................................................................32

iii

4.3Analysisofpresenceservertrafficload.........................................................................33
4.4MathematicalAnalysis..................................................................................................34
Chapter5.................................................................................................................................40
5.1Introduction...................................................................................................................40
5.2ProposedAccesspriorityModel....................................................................................41
5.3ProposedTimer.............................................................................................................42
5.4ProposedModeltoOptimizeSimulteniousSessions....................................................44
Chapter6.................................................................................................................................48
References:..............................................................................................................................50

iv

ListofFigures

Figure1.1:COPSPrinciple.........................................................................................................4
Figure2.1:IMSArchitectureOverview...................................................................................9
Figure2.2:SIPsessionsetupexamplewithSIPtrapezoid....................................................15
Figure3.1:Genericmediaauthorizationnetworkmodel.......................................................21
Figure3.2:Thecouplemodel................................................................................................23
Figure3.3:TheAssociatemodelusingonepolicyserver.......................................................26
Figure3.4:TheAssociatedModelusingTwoPolicyServers..................................................27
Figure3.5:TheNonAssociatedModel.................................................................................28
Figure4.1:SIPpresenceservicemessageflow......................................................................31
Figure4.2:SIPpresencearchitecture.....................................................................................32
Figure4.3:PublishandNotifyQueuesinaPS........................................................................35
Figure4.4:StateTransitionGraphforQueueSystemwithBatchArrivalandControlled
Vacation...................................................................................................................................38
Figure5.1:ExampleofPoC1tomanyGroupsession(voicetransmission)[54]...................40
Figure5.2:Markovmodelforaccessingsession....................................................................42
Figure5.3:MarkovmodelforPoCserverstates....................................................................44
Figure5.4:sessionstatesofaPoCClient...............................................................................46

Chapter1

Introduction

IP Multimedia subsystem is a set of arrangements that explains the Next Generation


Networking (NGN) architecture for executing IP based telephony and multimedia services.
IMS describes a complete architecture and framework that facilitates the convergence of
video, voice, data and mobile network technology over an IPbased infrastructure. IMS
remove the gap between two most successful communication models that is cellular and
Internettechnology.Therewasatimewecantevenimaginetoplayanonlinegameorjoin
avideoconferencefromanywhereusing3Ghandhelddevices.ThisisthemainvisionofIMS
toprovideallserviceincellularthattheInternetprovides.[11]

1.1 Background

IP Multimedia subsystem was firstly defined by the 3rd Generation partnership Project
(3GPP),whichiscollaborationagreementamonganumberoftelecommunicationstandard
bodies and that was the part their standardization work for supporting GSM network and
radio technology evolution. IMS was first launched in 3GPP Release 5 where session
initiatedprotocol(SIP)wasselectedasthekeyprotocolforIMS.Toincludeotherfeature
likepresenceandgroupmanagement,internetworkingwithWLAN,CSbasedsystem,fixed
broadbandaccessIMShasbeenenhancedinRelease6and7of3GPP.[11]
Anotherstandardsbody,3rdGenerationPartnershipProject2(3GPP2)alsostandardizedtheir
own IMS, which is fairly similar but not exactly same with 3GPP.3GPP2 added proper
correctionfortheirspecificissues[11].
IMS was intended to create the relationship between the existing traditional
telecommunication technology and Internet technology, so that IMS can help mobile
operators in initiating new and innovative services that will draw new subscriber and
maintain their existing base. IMS allow network operators to play a vital role in traffic
distributionandthatswhyIMShasgeneratedintenseresearchandstandardizationefforts.

1.2 OverviewofIMS

The Internet protocol (IP) is used to interconnect a large number of people all over the
world.Currentlymorethan15%populationoftheworldhasaccesstotheInternetandthis
rate is rapidly increasing day by day. The Internet provides interoperability at a very huge
scale,helpingpeopleusingdifferentterminaltocommunicate.[12]
FirstgenerationoftheInternetwasmostlydevotedtothetransportofnonrealtimedata;
serviceswithrigorousQualityofServices(QoS)requirementsarenowlargelyadopted(e.g.
telephonyoverIP(ToIP),videoconferencing).Theoperatorsrevenueisexpectedtogrowin
thenextfewyearsbecauseoftheshareofmultimediaservices.[13].Themovetowardall
IP architecture for service delivery seems to be a strong trend. In this situation customers
desire an access to personalized interactive, multimedia services on any device and
anywhere.Thisdesirerequirednewnetworkinfrastructures.TheIPMultimediasubsystem
(IMS) is seen as the perfect solution for fulfilling this requirement. IMS refers functional
architectureofmultimediaservices,dependsonInternetprotocols.ThemaingoalofIMSis
tomergeInternetandcellularworldsinordertofacilitaterichmultimediacommunications.
[13].

1.3MotivationfortheuseofIMS

BasicPrinciples:
OnethemostimportantaimofIMStomaketheeasiernetworkmanagement.Thereforeit
separates bearer and control functions. It means that IMS features an overlay service
delivery network on a packet switched infrastructure. Furthermore IMS should allow the
migration of circuit switched services for example voice telephony to the packet switched
domain. As a result IMS can make network management easier because all IP integrated
networkiseasytomanage.IMSisanendtoendarchitecturethatshouldsupportdifferent
kind of equipments. In addition, IMS service delivery should be independent of the
underlyingaccesstechnology.ThereforetheuseofopenInternetprotocolisspecified
InIMSforbetterinteroperability.IMSsupportsroamingbetweendifferentnetworks(3GPP
Release6).ThelevelofQoSthatcanbeaffordedinIMSnetworksdecidestheservicesthat
canbedeployedinsuchnetwork.SoInIMSnetworkQoSservicedeliveryissignificant.Asa
resultQoSmanagementfunctionalityisincorporatedintheIMSarchitecture.

IMSprovidesasetofcommonfunctionscalledserviceenablersthatarepossibletousebya
number of services (e.g. group/list management, presence, provisioning, billing etc). This
creates service implementation much easier and faster. In addition it allows a tight
interactionbetweendifferentservices.

BusinessandtechnicalMotivation:
Whileseveralnetworkoperatorsgettingtroublebecauseofdecreasingaveragerevenueper
user, IMS is seen as a solution for network operators. It permits the network operator to
play a vital role in service delivery, and bundle smart services with their basic offer.
Furthermore IMS should support the creation and deployment of modern services by
operators or third parties and as a result make new business standpoint. The quick
deploymentofIMSservicesshoulddecreasethetimetomarketandstimulateinnovation.
Thecombinationofdifferentservicesinonesession,thesinglesignonandunifiedbillingare
expectedtoincreasecustomersinterestandrevenueprospect.InIMStheoperatorisaware
oftheauthenticservicesthecustomerisusingforthatreason;suitablebillingschemescan
bedeveloped[14].
IMSisalsodesignedtopermitsubstantialnetworkinfrastructureandmanagementsavings
asaresultgetbettercosteffectiveness.ProbableservicesonIMSnetworkarepushtotalk
over cellular (PoC), Instance Messaging (IM), Mobile gaming or a combination of different
existingservices.
IMS is aimed to facilitate the deployment of better and richer services. It should enable
thedeliveryofrealtimeIPbasedcommunications[13].Itshouldbuildtheincorporationof
realtime, near realtime and non realtime applications easier. It should permit a user to
accessitsservicesfromanysupportedmedia.

1.4ProtocolsusedinIMS

Nearly all of the protocols used in IMS are standardized by the IETF. They are shortly
discussedinthefollowingsection.

Signalingandmediaflowdescription:
The key signaling protocol used in IMS is called the session initiation protocol (SIP). It was
firstly defined in RFC 2543 (obsolete) and later on RFC 3261 [15, 16]. SIP uses some

principles of HTTP and SMTP, which are most successful Internet protocols. SIP has been
chosen in IMS importantly because it fulfill IMS requirement and it is considered flexible
(several extensions are standardized) and secure. The major function of SIP is the
establishment,modification,andterminationofmultimediasessionbetweentwoterminals.
The body of SIP message illustrated using the Session Description Protocol (SDP). SDP
describemediaflowslikeaddress,port,mediatype,encodingetc.
SIP is possibly key protocol in IMS architecture. SIP is capable to manage subscriber
management, service control, single sign on, QoS authorization, billing, resource
managementetc.

Authentication,AuthorizationandAccounting:
Diameter is a current Authentication, Authorization and Accounting protocol changing the
RADIOUS protocol [17]. Diameter security is granted by IPSEC or TLS. Diameter is used in
IMS service framework by the Application servers (Ass), ICSCF, and SCSCF in their
exchangeswithHSSincludinguserprofiles.ItsalsousedintheexchangesamongRACSand
theASandCLF.

PolicySupport:
The Common Open Policy service (COPS) is a protocol that supports policy control over
Quality of Service (QoS) signaling protocols like RSVP. It is used to communicate decisions
and policy requests between Policy Enforcement Points (PEP) and Policy Decisions Points
(PDPs)(seefigure1.1[12])

PDP

COPS

PEP

Figure1.1:COPSPrinciple

COPSsupporttwopolicymanagementmodels:
1)TheoutsourcingmodelidentifiesthatPDPPEPexchangehappenforeachpolicydecisions
(e.g.COPSforRSVPRFC2748andRFC2749[12])
2)IntheconfigurationorprovisioningmodelthePEPaccumulatespolicyrulesnamedbythe
PDP and use them for policy decisions. This offered brilliant scalability for the associated
protocols(COPSPR).

Intheconfigurationmodel,thepolicyrulesrequiretobestoredinthePEP.Theequivalent
data structure is called the Policy Information Base (PIB). It explains the configurable
mechanisms for implementing policies in the PEP also the events that can trigger the
exchangeofpolicyinformation.

AdditionalProtocols:
H248 is descendant of the Media Gateway Control Protocol (MGCP) used for managing
mediaservingfunctionsinanIMSenvironment.ItisclassifiedinRFC3015[18].
TheRealTimeProtocol(RTP)offerstransportfunctionfortransmittingrealtimedata.Itis
used in concurrence with a control protocol called Real Time Control protocol (RTCP) in
order to permit monitoring of the data delivery and to present minimal control and
identificationfunctionality.
ItistobenotedownthattheuseofIPV6isobligatoryinIMSnetworkscomplyingwith3GPP
release5butdifferentapparatusvendorimplementationssupportbothIPV4andIPV6.

1.5QoSsupportinIMS

TheschemeoftransformingawelleffortIPnetworkbyinitiatingendtoendQoSguarantees
isasignificantdriverforthedeploymentofIMS.ThisiskeyconcernbecausetheQoSthat
theIMSarchitectureisabletopresentdeterminestheservicesthatcanbedeployedonit,
andthevalueissupposedtoresideinrealtimemultimediaservices.
Twopoliciesaretypicallyassociatedforprovidingagoodlevelofqualityofserviceinpacket
networks.Thefirstentailsavoidingcongestionphenomena.Thiscanbemadeby

Employing Connection Admission Control (CAC), resource reservation, or simply over


dimensioningthenetwork.Thesecondtechniquecenteronmanagingcongestionittypically
reliesontrafficdifferentiationforproviding better QoSto most importantflows.Different
standardsarerelatedtothisidea;themostcommononeisDiffServ.

AswediscussedaboveIMSopensupnewstandpointsfornetworkoperators.Butdifferent
technical and business challenges have to face in order to allow the wide adoption of this
promisingtechnology.FurthermoreIMShastosolveitsinherentnegations:itcommunicates
onIPtechnologiesallowingfreecommunicationbutaimsatcontrollingIPservices.

1.6ThesisMotivation

IMS is the technology that will combine the internet (packet switching) with the cellular
word(circuitswitching).ItwillbuildInternettechnologieslikemail,web,videoconferencing,
instant messaging, and presence almost all over. Main reasons for introducing IMS was to
provide quality of service (QoS) needed for enjoying real time multimedia sessions. Other
reasonsweretobeabletochargemultimediasessionsappropriately.Moreovertheaimof
IMSistoprovideallservices,currentandfuture,thattheInternetprovide.

Problemstatement:
Presence server can easily be overloaded while there are many numbers of watcher and
subscriber requesting for presence service at the same time so we need to mitigate
messageprocessing load of a presence server. The PushtoTalk over cellular (PoC) server
needstobedimensionedtomakerevenueforserviceprovider.
Inthethesiswewillexplaindifferentsessionestablishmentmethodthenwewillidentifythe
best method for session setup in mobile environment for the IMS terminal and we will
discuss briefly presence server of IMS system. We will study different kind of Queuing
mechanism. Finally we will propose a new queuing mechanism that will increase
performance of presence server at IMS system and we will discuss several models to
dimensionIMSPushtoTalkovercellularservice.

1.7ThesisOutline

Chapter1:Chapter1willcontainBasicinformationofIMSandLiteraturereview.
Chapter2:Inchapter2,willdrawaIMSarchitectureandwillexplaindifferentcomponentof
IMS architecture like SIP server, User database known as home subscriber server (HSS),
Application server (AS), Media resource function (MRF), Public switch telephone network
(PSTN)etc.
Chapter 3: There are many methods for session establishment .At first we will explain
different session establishment method and then we will introduce the best method for
sessionsetupinmobileenvironmentfortheIMSterminal.
Chapter 4: we will discuss briefly presence server of IMS system in this chapter. We will
study different kind of Queuing mechanism. Finally we will propose a new queuing
mechanismthatwillincreaseperformanceofpresenceserveratIMSsystem.
Chapter 5:In this chapter we will discuss about the dimension of PoC service for service
providers with regards to controlling PoC session access, optimal PoC session timer, path
optimizationandnumberofallowablesimultaneousPoCsessionsforgivennetworkgradeof
service.
Chapter6:conclusionandfuturework.

Chapter2
IMSArchitecture

2.1Introduction

Theipmultimediasubsystemdescribesthefunctionalarchitectureforamanagedipbased
network. The aim of IMS is to acclimatizing to different applications e.g. push to talk over
cellular, presence, instant messaging, streaming, multiplayer game etc. IMS construct on
IETF protocol like SIP, SDP, DIAMETER, MGCP etc. to make complete multimedia system
providing a wide range of session border control. Call access control, reachability and
security.
ThethirdGenerationpartnershipproject(3GPP)hasproposedIMSinrelease5onInternet
protocol version 6(Ipv6) but it is negotiated for Ipv4 because the industry is not ready to
migratetoIpv6now.[21].
TheIMShasbecomeraisinglyadmiredbothwithwirelineandwirelessserviceproviderasit
isintendedtoincreasecarrierrevenues,deliverintegratedmultimediaservice,andanopen,
standardbasednetwork.

2.2IMSArchitectureDesign

IntheGeneralarchitectureofIMS3GPPstandardizefunctionsbutnotnodes.Sowecansay
thattheIMSarchitectureisacollectionoffunctionslinkedbystandardizedinterfaces[Figure
2.1].Ifanyimplementerwanttheycanmergetwofunctionsintosinglenodeaswellasthey
candividesinglefunctionintotwoormorenodes.
Figure 2.1 shows an overview of the IMS architecture as standardized by 3GPP.here we
includeonlymostimportantnodes.

SIP-AS
IM-SSF

MRFC

Access
Network

P-CSCF

MRFP
HSS
SGW

S-CSCF
Access
Network

MGCF

P-CSCF

SLF

I-CSCF

MGW
BGCF

Figure2.1:IMSArchitectureOverview

An IMS network consists of many SIP servers known as CSCFs (Call Session/Control
Functions), user databases known as Home Subscriber Servers (HSS). Application Servers
(AS), Media Resource Functions (MRF), Public Switched Telephone Network (PSTN)
Gatewaysetc.

CallSession/ControlFunction(CSCF):
CSCFisaSIP(SessionInitiationProtocol)server,whichismainlyresponsibleforSIPsignaling
intheIMS.CSCFsareveryessentialintheIMSarchitecture.Itsserviceindependentaccess
point distributes all incoming calls to application services and manages initial subscriber
authentication.TheCSCFusesSIPmessagetoforwardthecalleventtotheserviceandadds
additionalheaderinformationtomaintaincontrolofthecall.

TheCSCFcomponentusesIMSservicecontrolinterfacetointerceptcallsignalingandpassit
to application services for processing. There are three types of CSCFs depending on the
functionalitytheyprovide.ThedescriptionsofthesethreetypesofCSCFsarehereunder:

1.PCSCP(ProxyCSCF)
The PCSCP is the first point of contact between the IMS terminal and the IMS networks.
According to SIP principle PCSCP acts as an inbound/outbound SIP proxy server that is all
requestsinitiatedbytheIMSterminalordestinedtotheIMSterminalpassthroughPCSCP.
ThePCSCPisresponsibleforsecurityofallmessagesbetweenthenetworkanduser.Firstly
it set up IPSec security associations in the direction of IMS terminal. When the PCSCP
authenticatestheuserthePCSCPstatestheidentityoftheuserfortheallothersnodein
thenetwork.
Furthermore,ThePCSCPverifiestheaccuracyofSIPrequestsentbytheIMSterminal.The
PCSCP also includes a compressor and a decompressor of SIP messages and PDF (Policy
decisionFunction).ThePDFmanagesqualityofserviceoverthemediaplane.
An IMS network normally includes a number of PCSCF for the sake of scalability and
redundancy.EachofthemservesanumberofIMSterminalsdependingonthecapacityof
thenode.

2.ICSCF(InterrogatingCSCF)
The ICSCF presents functionally of a SIP proxy server located at the edge of an
administrative domain. ICSCF has DIAMETER interfaces to the SLF (Subscriber Location
Function)andHSS(HomeSubscriberFunction)andretrievesuserlocationinformationand
routetotheappropriatedestination,typicallyanSCSCF.
The ICSCF may also encrypt the parts of the SIP messages that contain important
informationaboutthedomainlikethenumberofserversinthedomain,theirDNSnamesor
theircapacity.ICSCFsIPaddressispublishedintheDNSofthedomainas,thatdomainis
theentrypointofallSIPpackets.

10

3.SCSCF(ServingCSCF)
The SCSCF is a SIP server that performs session control. Beside this it also act as a SIP
register.TheSCSCFisthecentralnodeofthesignalingplanandalwayslocatedinthehome
network.ItmaintainsabindingbetweentheuserlocationandtheusersSIPaddressofthe
record(alsoknownaspublicuseridentity).TheSCSCPalsohasadiameterinterfacetoHSS
likeICSCF.OneofthemainfunctionsoftheSCSCFistopresentSIProutingservice.

ApplicationServer(AS)
The AS (Application Server) is a SIP entity that hosts and executes IP Multimedia Services.
IMS permit quick service creation and delivery. Several Services like telephony and
messaging can be hosted in a single application server. Different services in a single
applicationserverreducetheworkloadofCSCFinthecontrollayer.

MediaResourceFunction(MRF)
TheMRF(MediaResourceFunction)providesthesourceofmediainthehomenetwork.Itis
dividedintotwoparts;oneisthesignalingplanenodereferred,asMediaResourceFunction
Controller(MRFC)andtheotherismediaplanenodereferredasMediaResourceFunction
Processor (MRFP). The MRFC communicates with an application service and directs a
separatemediaservertomanagethemediastream.ItmanagestheresourceintheMRFP
viaanH.248interface.TheMRFPimplementsallthemediarelatedfunctionslikeplayingor
mixingmedia.

BreakoutGatewayControlFunctions(BGCF)
The BGCF (Breakout Gateway Control Function) is a SIP server that incorporates routing
functionalitybasedontelephonenumbers.Itisonlyusedinsessionsthatareinitiatedbyan
IMSterminal.

ThePublicSwitchedTelephoneNetwork(PSTN)Gateways
The PSTN gateway provides an interface to a circuitswitched Network, allowing IMS
terminals to make and receive calls to and from the PSTN or any other circuit switched

11

network. A PSTN gateway can be decomposed in to MGCF (Media Gateway Control


Function),SGW(SignalingGateway),andMGW(MediaGateway).

MGCF(MediaGatewayControlFunction)
ThisistheessentialnodeofPSTNgatewaythatroutescallsfromortoSS7/TDMchannelsor
PSTN/PLMN networks. All calls routed through this media gateway enter the IMS core
networkasSIP/RTPmediastreams.RTPstreamsarerouteddirectlybetweenmediaservers,
gatewaysandendpoints.TheMGCFmanagetheresourcesinMGW.

SignalingGateway(SGW)
ThesignalingGatewayinterfacesthesignalingplaneofthePSTNnetworkorcircuitswitched
networks.SignalingGatewayperformslowerlayerprotocolconversion.

Mediagateway(MGW)
TheMGWinterfacesthemediaplaneofthePSTN(PublicSwitchedTelephoneNetwork)and
CS (Circuit Switched) Network. The MGW is able to send and receive IMS media over the
RealTimeProtocol(RTP).MGWalsousesoneormorePCM(PulseCodeModulation)time
slotstoconnecttotheCSnetwork.Inaddition,theMGWperformstranscodingwhenthe
IMSterminaldoesnotsupportthecodecusedbytheCSside.

HomeSubscriberServer(HSS)
TheHomeSubscriberServer(HSS)providesacentralrepositoryforsubscriberinformationin
IMS architecture. The HSS stores all subscriber information necessary to handle session
between users and provide service to subscriber. The information includes among other
item,securityinformation,andlocationinformation,userprofileinformationincludingthe
servicesthattheuserissubscribedtoandtheSCSCFallocatedtotheuser.
A network may contain more then one HSS when the number of subscriber is too high.
NetworkwithasingleHSSdonotneedaSubscriberLocationFunctions(SLF)butifnetwork
contain more then one HSS do require SLF. The SLF is a simple database that maps users
addresstoHSSs.

12

ChargingEntities
Charging entities are used to maintain billing information for subscribers using network
service. For offline (Rf) and online (Ro) charging entities IMS uses diameter messages. To
provide different service IMS uses different functional components. For example to
transportmedia,IMSusesCallSessionControlFunction(CSCF),IMSServiceControlInterface
(ISC), Session Border Controller (SBC), Media Gateway Control Function (MGCF), Media
Resources Function (MRF), Media Resource Function Controller (MRFC), Home Subscriber
Server(HSS)andChargingEntities.

2.3IMSandSIP

The IP Multimedia Subsystem is an important service notion allowing next generation


networks to maximize their potential from full multimedia service offering. IMS has a
different number of protocols each having a particular function. This provides flexibility,
simplicity,modularityandextensibilityforarobustandcomplexnetworkinfrastructure.SIP
is a signaling protocol. Signaling protocol means end point involved in the call and the
networkrouterstreatthissignalingpacketasanyregulardata.
The session initiation protocol (SIP) [22] lies at the core of the IMS architecture. It is a
prominentprotocoltodayinthethirdgenerationnetworks.SIPisarealtimecommunication
protocol mainly facilitates multimedia data transfer in IMS.SIP has been chosen in IMS to
playthemainroleforsettingupthesessionwhileinterworkingwithotherprotocols.Itisa
lightweight, textbased protocol highly flexible and readily scalable. SIP is about initiating
interactivecommunicationssessionsbetweenusers.
It also manages termination and modifications of session in progress as well. When the
requirementisrealtimesessionestablishmentSIPcanresideinthecommunicationdevice
andmanagethesesessions.SIPhasbeenexpandedtosupportvideoandinstantmessaging
applications. IMS defines standard control plane interfaces based on SIP for creating new
applications.TherearemuchmoreareasthatSIPperform:sessionscallsetupandteardown
and signaling for features like call hold, caller ID, conferencing and call transferring. SIP
implementationiswellacceptedbecauseofitscompatibilitywithotherstandardslikevoice
XML. Also the SIP framework accept service provider to quickly introduce extensions like
securitycompressionetctomeettheserviceneeds

13

OverviewofSIPOperations:
SIPSupportfiveaspectsofestablishingandterminatingmultimediacommunication:
Userlocation:determinationoftheendsystemforcommunication.
User availability: determination of the eagerness of the called party to involve
communications.
Usercapabilities.Determinationofthemediaandmediaparameters.
Sessionsetup:setupsessionparametersatbothcalledandcallingparty.
Session management: transfer and termination of sessions, modifying session parameters
andinvokingservices.
SIP can be used with other IETF protocols to make complete multimedia architecture.
Normally,thisarchitecturewillincludeprotocolsliketheRealTimetransportprotocol(RTP)
(RFC 1889 [23]) for real time data transfer and providing QoS. The RealTime streaming
protocol (RTSP) (RFC 2326 [24]) for managing distribution of streaming media, the Media
GatewayControlProtocol(MEGACO)(RFC3015[25])formanaginggatewaystothePublic
SwitchedTelephoneNetwork(PSTN)andSessionDescriptionProtocol(SDP)(RFC2327[26])
for illustrating multimedia sessions. So in order to provide complete service SIP should be
usedinconjunctionwithotherprotocols.
NowweintroducethebasicoperationsofSIPusingsimpleexample[27].Figure2.2showsa
typical example of a SIP message exchange between two users Morshed and Sumon (all
messagelabeledwithletterM).InthisexampleMorshedcallsumonfromhispcusingaSIP
application(namelysoftphone)overtheInternet.TherearetwoSIPproxyserversthatact
onbehalfofMorshedandsumontoprovidethesessionestablishment.
MorshedcallssumonusinghisSIPidentity,atypeofUniformResourceIdentifier(URI)called
aSIPURI.Inthiscase,itissip:sumon@tcl.comwheretcl.comisthedomainofsumonsSIP
service provider. Morshed has a SIP URI of sip: morshed@flora.com. SIP is a HTTP like
request/responsetransactionmodel.Everytransactionconsistsofarequestthatinvokesa
specificfunctionontheserver,atleastoneresponse.Inourexamplethetransactionstarts
with Morsheds soft phone sending an INVITE request addressed to sumons SIP URI. The
INVITE request contains a number of header fields. Header fields provide additional
informationaboutamessage.INVITEincludeauniqueidentifierforthecall,thedestination

14

address,MorsehdsaddressandinformationaboutthetypeofsessionthatMorshedwishes
toestablishwithSumon.

flora.com
proxy

tcl.com
proxy

Morsheds
Softphone

Sumons
SIP phone

INVITE M1
INVITE M2
100 Trying M3

INVITE M4
100 Trying M5
180 Ringing M6
180 Ringing M7

180 Ringing M8

200 OK M10

200 OK M9

200 OK M11
ACK M12
Media Session
BYE M13
200 OK M14

Figure2.2:SIPsessionsetupexamplewithSIPtrapezoid

15

TheINVITE(MessageM1inFigure2)mightlooklikefollowing:

INVITE sip:sumon@tcl.com SIP/2.0


Via: SIP/2.0/UDP pc33.flora.com;branch=z9hG4bK776asdhds
Max-Forwards: 70
To: sumon <sip:sumon@tcl.com>
From: morshed <sip:morshed@flora.com>;tag=1928301774
Call-ID: a84b4c76e66710@pc33.flora.com
CSeq: 314159 INVITE
Contact: <sip:morshed@pc33.flora.com>
Content-Type: application/sdp
Content-Length: 142

Thefirstlineofthemessagecontainsthemethodname(INVITE).Thelinesthatfollowarea
list of header fields. Our example contains a minimum required set. The header fields are
brieflydiscussedbelow:
Viacontainstheaddress(pc33.flora.com)atwhichMorshedisexpectingtogetresponseto
thisrequest.Italsocontainsbranchparameterthatidentifiesthistransaction.
Tocontainadisplayname(sumon)andtheSIPURIofthedestination(SIP:sumon@tcl.com)
Fromalsocontaindisplay name (Morshed)andthe SIPURI(sip: morshed@flora.com) that
specifythecreatoroftherequest.
CallIDcontainsauniqueidentifierforthiscall,createdbycombinationofarandomstring
andthesoftphonehostnameorIPaddress.
Cseqcontainsamethodnameandaninteger.
MaxForwardslimitsthenumberofhops,arequestcanmaketoitsdestination.
Contenttypecontainsadescriptionofthemessagebody(notshown)
Contentlengthcontainsanoctet(byte)countofthebody.

16

In this example the proxy server (flora.com) receives the invite request and sends 100
(trying) response to Morsheds softphone. The 100 (trying) response specifies that the
INVITE has been received and the proxy is working on it to route the INVITE to the
destination.Thetcl.comproxyserverreceivestheINVITEand100(trying)responsebackto
the flora.com indicates that INVITE has received and is processing the request. tcl.com
serverproxiesittothesumonsSIPphone.SumonsphonereceivestheINVITEandaware
Sumon that incoming call from Morshed. Sumons SIP phone shows this in a 180 (Ringing)
response,whichisroutedbackinareversedirection.Inourexamplesumonmakedecision
toreceivethecall.WhenhepicksupthehandsethisSIPphonesendsa200(ok)response,
indicatethatthecallhasbeenresponded.The200(ok)(MessageM9infigure2)mightlook
likethisfollowing:

SIP/2.0 200 OK
Via: SIP/2.0/UDP server10.tcl.com
;branch=z9hG4bKnashds8;received=192.0.2.3
Via: SIP/2.0/UDP bigbox3.site3.flora.com
;branch=z9hG4bK77ef4c2312983.1;received=192.0.2.2
Via: SIP/2.0/UDP pc33.flora.com
;branch=z9hG4bK776asdhds ;received=192.0.2.1
To: Bob <sip:sumon@tcl.com>;tag=a6c85cf
From: Alice <sip:morshed@flora.com>;tag=1928301774
Call-ID: a84b4c76e66710@pc33.flora.com
CSeq: 314159 INVITE
Contact: <sip:sumon@192.0.2.4>
Content-Type: application/sdp
Content-Length: 131

The first line of the response contains the response code (200) and reason phrase (ok).
The remaining lines contain header fields.

17

2.4SIPandQualityofService
To provide a best effort IP network by introducing end-to-end QoS guarantees is an
important driver for the development of IMS. This is a main consideration because the
level of QoS that the IMS architecture can provide determines the services that can be
deployed on it and value is assumed to reside in real time multimedia service. IMS
ensures QoS by session layer negotiation with resource granted at transport layer.
SIP establishes connection between two or more end point in an IP network. The QoS
parameters for the session are negotiated during the setup. So the performance
assessment of IMS based network should be from QoS perspective.

18

Chapter3
Sessionestablishment

3.1Introduction

Several methods have been introduced through which end hosts can use a session
managementprotocollikesessionmanagementprotocol(SIP)tocompletethatrequirement
of quality of service (QoS) must be meeting in order to have a successful session
establishment. Furthermore a resource reservation protocol (RSVP) is used to request the
resources need to fulfill the endtoend QoS for media streaming. In order to protect
deception and make sure perfect billing, some linkage is uses to make sure that the
resources being used to provide the requested QoS are inline with the media streams
requestedforthesession[31]
Inthisofthisthesiswearegoingtodescribethatsortoflinkagethroughuseofatokenthat
presents capabilities like of a gate in and of a ticket in the push model. A session
management server or a policy server produce that token and is transparently broadcast
throughouttheendhosttotheedgerouterwhereitisusedascomponentofthepolicy
controlledflowadmissionprocess[32].
There are few environments, authorization of media streams can expand by the fact that
preestablished relationship subsists between elements of the network like session
managementserver,edgerouters,policyserversandendhosts.Preestablishedrelationship
shows that the several network elements are configured based on the identities of other
network elements and if it is required that are configured with security keys, need to
establish a true relationship. In further environments, on the other hand such pre
established relationships may not exist either because of the difficulty of creating these
applicationslikeinanetworkwith manyelements orbecauseofseveralbusinessentities
engaged like service provider and access provider or due to the dynamic nature of these
associations like mobile environment. In this chapter we will explain several scenarios and
methods used for exchanging data between networks elements in order to authorize the
resourceusesforaserviceandtoorganizeactionsbetweenthe

19

Session and resource management bodies. Particular extensions to session management


protocols, to resource reservation and COPS for dealings along with policy server. The
framework can be launched to a multimedia services scenario by using several type of
signalingprotocols.
InthischapterwearegoingtodescribemediaauthorizationconceptthroughSIPforsession
signaling, for resource reservation RSVP and COPS for dealings with the policy server. This
framework is possible to introduce to a multimedia services picture by using different of
signalingprotocols.

Figure3.1providesagenericmodelforsessionestablishment,QoSandPolicyenforcement.

20

+-------------------------------------+

+---+

Service Control Domain

| +-----------------------+ +--------+|

| I |

| |Session management

| |Policy

||

| n |

| |server

| |Server

||

| t |

| | +---------+ +------+

| |

| | |SIP Proxy| |PEP

+----+||<->| e |

|<-|-|->|PDP |||

| | +---------+ +------+

| |

| r |

+----+||

| - |

| +-----------------------+ +--------+|

| c |

| o |

+-------------------------------------+

| n |
| n |

+-------------------------------------+

| e |

| RCD - Resource Control Domain

| c |

| t |

| i |

+------------+

+-------------+

| n |

+----------+

|Edge Router |

|Policy Server|

| g |

| End

| Host

|+----------+|

|+----------+ |

| N |

|+--------+|

||RSVP Agent||

||PDP

| e |

| |

||RSVP

||<->|

|+----------+|<-->|+----------+ |

|<->| t |

||Client

||

|+----------+|

| w |

|+--------+|

|| PEP

||

| o |

||SIP User||

|+----------+|

| r |

||Agent

||

+------------+

+-------------+

| k |

|+--------+|

+----------+

+-------------------------------------+

+---+

Figure3.1:Genericmediaauthorizationnetworkmodel.

21

End Host (EH): The End Host is a sort of device that is used by subscriber to contact with
networkservice.TorequestnetworkservicestheEndHostincorporateaclientlikeSIPand
alsoanotherclientforrequestingnetworkresourcelikeRSVP.
EdgeRouter(ER):itisanetworkelementthatjointsbetweentheendhosttotherestofthe
resourceresourcesofthecontroldomain.TheEdgeRouterhasheldaPEPtoimposepolicies
interrelatedtotheresourceusageintheresourcecontroldomainbytheEndHost.Itsalso
holdsasignalingagentformanagingresourcereservationrequestwhichisprovidedbyEnd
Host[33].
PolicyDecisionPoint(PDP):thepolicydecisionpointisatypeoflogicalentitythatisplaced
inthepolicyserverthatisaccountableforauthorizingorignoringaccessbetweenservices.
Policy Enforcement point (PEP): The PEP is also a type of logical entity which can be
enforcingpolicydecisionmadebythepolicydecisionpoint.
PolicyServer(PS):thisisaonetypeofnetworkelementthatcanholdaPDP.Weshouldbe
in mind service control must be containing PS. Domain for controlling use of services and
there might be a different PS between the resource control domain to manage use of
resources along with the packet forwarding path. Also the topology of network might
involve so many policy servers in also domain. Though, they provide pleasant policy
decisionstoexplaintheappearanceofasinglePDPineveryDomain[34].
Resource Control Domain (RCD): The resource control domain is a one type of logical
groupingofelements,whichaffordconnectivityamongthepacketforwardingpathtoand
from the End Host. The RCD holds ER and PS entities those responsibilities comprise
managementofresourcealongwiththepacketforwardingpaths.
Service Control Domain (SCD): this is also a type of grouping of elements that executes
applicationandcontenttosubscribeoftheirservices.Thesessionmanagementserver
ResideintheSCDwiththePS.MaybetherearemorethanoneScadswithinanautonomous
domain.
Session Management Server (SMS): The SMS is one type of network element which
providing session management services for example telephony call control. The session
managementserverholdsaPEPtoimplementpoliciesthatrelatedbyusingofservicesfrom
theEndHost.MoreoveritscontainuniquetypeofsignalingagentorproxyserverlikeSIPfor
handlingservicerequestswithintheEndHost[35].

22

3.2TheCoupleModel

In some environments, a preestablished genuine relationship exists between elements of


thenetwork(likeedgerouter,endhosts,sessionmanagementserversandpolicyservers)in
thischapterwereferredthisasacoupledmodelwhichshowthefixedrelationshipalong
withtheentitiesthatispresumed.Thekeyfeatureforthisscenarioisdescribedbelow:

Policy decisions, that comprises media authorization is made by particular policy


server.
Session management server, the edge router, and policy server concerned by
establishing the session. For example the end host must be configured to use a
session management server connected with the Edge Router by which the EH is
established[35].
There are predefined protected relationship between the SMS and the PS and
betweentheERandthePS.

+------+
1

2 |

|-------->| Session Management |----->|

|<--------|

| End

| Policy |

| Host |

| Server |

|-------->|

Edge

|----->|

|<--------|

Router

|<-----|

+--------------------+

Server

|<-----|

+--------------------+

+--------------------+

+--------------------+

+------+

3 |

7 |

+--------+

Figure3.2:Thecouplemodel

23


CoupledModelMessageFlows:
PSandSMSandbetweenthePSandER,communicationswiththeseentitiesarepossibleto
describe.Herewearegoingtodescribeonlytheoriginatingsideflowbecauseofsimplicity.
Herewewillonlyconsiderthereisonepolicyserverisservingboththeservicecontroland
the resource control domains. And there is predefined protected relationship among the
terminatingsidealso.

The End Host send a session setup request (like SIP invite) to the session
management server monitoring. The media stream should be used in the
session.Asadivisionofthisstep,theEndhostmightbeauthenticatingitselfto
thesessionmanagementserver[35][36].
Thesessionmanagementserver,probablyjustafterwaitingforthenegotiation
of the media streams would be completed, sending a policy decision request
(like COPS REQ) by the policy server as it could conclude if the session set up
requestcouldbeallowedtobeproceeding.
The policy server send a decision (COPS, DEC) to the session management
server,maybeaftermodificationoftheparametersinthemediashouldbeused.
Incorporatedinthisresponseisatokenthatcanbeusedbythepolicyserver
forclassifyingthesessionandthemediashouldbeauthorized.
ThesessionmanagementserversendsasignaltotheEndHost(SIP200or183)
mentioning that session set up is complete or in progressing. Included in this
response is an explanation of the negotiated media beside the token with the
policyserver.
Policy server that the end host issued a request (RSVP, PATH) to preserve the
resourcesneedforprovidingthenecessaryQoSforthemediastream.
The Edge Router interrupts the reservation request through sending a policy
request (COPS, REQ) to the policy server for formative if the resource
reservationrequestmightbepermittedtoproceed.Includinginthisrequestis
thetokenfromthepolicyserverwhichisprovidebytheEndHost.Thistokenare

24

uses by the policy server to association the request to resources among the
mediaauthorizationthatisbeforeprovidedtothesessionmanagementserver.
The policy server is throw a decision (example COPS, DEC) to the edge router.
Maybeaftermodificationoftheparametersoftheresourcesmustbepreserve.
TheEdgeRoutermaybeafterwaitingforendtoendnegotiationforresources
to be completed, by sending response to the End Host (Example RSVP, RESV)
representingthatresourcereservationisalmostcompleteorisinprogressing.

3.3TheAssociatedModelusingonepolicyserver

In this scenario, there is one more instance of the session management servers, policy
serversandEdgeRouter.Thisshowthewaytothenetworkofsocomplexitythatisprevents
issued knowledge of the network topology to every type of net work entities. The main
featuresofthissetupexplainasbelow:
Policy decisions also media authorization is made by the similar type of policy server for
equallytheEdgeRouterandthesessionmanagementserver.Thoughthepolicyservercan
changeonaneverytransactionbasis.
Sessionmanagementserver,theedgerouterandthepolicyserverisengageinestablishing
thesessionisnotknownapriori.Forexampletheendhostprobablydynamicallyconfigured
touseoneofpoolofsessionmanagementserverandtheentiresessionmanagementserver
probablystaticallyconfiguredbyusingoneofapoolofpolicyservers.
TheEndhostshouldbemobileandcontinuallychargingtheedgerouterthatfromitspoint
ofattachmentusertocommunicatewiththerestofthenetwork.
TherearesecretrelationshipbetweentheSMSandthePSandinbetweentheERandthe
PS.

25

+---------------------+
|

SMS 'n'

|<-->|

+---------------------+
+------+

: : :
1

+---------+

+--------+ |
|

| |

2 |

| |

|-------->| Session Management |----->|

| |

|<--------|

| |

| End

+--------------------+

PS 'm' |

Server 1

|<-----|

+--------------------+

3 |

| |

| Policy | |

| Host |

+--------------------+

| Server | |

+-+------------------+ |

| |

|-------->|

Edge

6 |

| |

|<--------|

Router

|----->|

| |

ER 'n'

|-+

+--------------------+

+------+

| |

7 |

| |

<-----|

|-+

+--------+

Figure3.3:TheAssociatemodelusingonepolicyserver.

3.4TheAssociatedModelusingtwopolicyserver

Inthisscenario,therearealsomorethanoneinstanceofthesessionmanagementserver,
EdgeRouterandPolicyserverthisleadtoanetworkofsufficientdifficultythatitprevents
distributingknowledgeofnetworktopologytoallothernetworkentities.Themainfeature
ofthisscenarioisdescribingbelow:

Policydecisionwithmediaauthorizationispreparedbypolicyservers.
ThereisaPSintheresourcecontroldomainwhichisdetachingformthePSonthe
servicecontroldomain.

26

TheEdgeRouter,SessionManagementServerandPolicyServersareengagedinset
upthesessionisnotknownapriori.Forexample,theEndHostmaybedynamically
configuredtouseoneofapoolofSessionManagementServers37].
ThereisonetypeofpredefinedsecretrelationshipbetweentheSMSandtheSCD,
PS
ThereisakindoffirstlydefinedsecretrelationshipbetweentheERandtheRCDPS.
ThereisalsoasecretrelationshipwithintheRCDandSCDpolicyserver.

+---------------------+
|

SMS 'n'

|<-->|

+---------------------+
+------+

: : :
1

+---------+

+--------+ |
|

| |

2 |

| |

|-------->| Session Management |----->|

| |

|<--------|

| |

| End

+--------------------+

PS 'm' |

Server 1

|<-----|

+--------------------+

3 |

| |

| Policy | |

| Host |

+--------------------+

| Server | |

+-+------------------+ |

| |

|-------->|

Edge

6 |

| |

|<--------|

Router

|----->|

| |

+------+

ER 'n'

|-+

+--------------------+

| |

7 |

| |

<-----|

|-+

+--------+

Figure3.4:TheAssociatedModelusingTwoPolicyServers

27

3.5TheNonAssociatedModel

Inthecaseofnonassociatedmodel,thesessionmanagementserverandtheedgerouters
connectedwithseveraltypesofpolicyservers.Thenetworkentitiesdonothaveanypriori
knowledgeonthetopologyofthenetworkandthereisnopreestablishedsecretcorrelation
betweentheentitiesintheresourcecontroldomainandintheservicecontroldomain[38].
Thekeyfeaturesofthesescenariosareillustratingbelow:
The PS along with the resource control domain is divided from the PS with the
servicecontroldomain.
HerethereisapredefinedsecretrelationshipbetweentheSCDPSandtheSMS.
ThereisalsoapredefinedrelationshipbetweentheERandRCDPS.
But there is no predefined secret relationship between the SCD and RCD policy
serverandbetweentheERandSMS.

+--------+
+------+

|
1

|-------->| Session Management |----->| Policy |

|<--------|

| End

+--------------------+

Server

2 |

|
SCD

|<-----| Server |

+--------------------+

3 |

+--------+

| Host |
|

+--------+

|-------->|

Edge

|<--------|

Router

+--------------------+

|----->|

|
RCD

|<-----| Policy |

+--------------------+

7 | Server |

+------+

+--------+

Figure3.5:TheNonAssociatedModel

28

3.6Conclusions

In this chapter mainly we have describe three models for session set up with media
authorization.
Thecoupledmodelthatpresumesaprioriknowledgeofthenetworktopologyandthereare
preestablishedsecretrelationshipsbepresentwithinallnetworkentities.
Theassociatedmodel,wherethereisacommonorsecretpolicyserverbutnetwork
topologyknowledgeisnotwellknownasapriori.
IntheNonAssociatedmodelnetworktopologyknowledgeisalsonotwellknownas
priori. There are different policy server are engaged and there is no secure
Relationshipbetweenallthepolicyservers.

TheAssociatedmodelissuitablewiththeenvironmentwherenetworkentitiesareengages
byestablishingasessionwhichhasapredeterminedsecretrelationshipbutthereelements
should be concrete dynamically in the session set up time. The NonAssociated model is
perfect for some kind of environment where network topology is complex and there is no
trustrelationshipbetweendomains.Foranygivennetworkoneormoreofthesemodelis
possibletoapplywhilethemodeltobeusedmightbechosenonthesessionestablishment
timedependsonknowledgeoftheendpointsengageinthecall.

29

Chapter4

IMSPresenceServer

4.1Introduction

Presence service permits a user to be informed about the reachability, availability, and
willingnesstocorrespondwithotheruser.Ithasturnintoakeyenablerformanyadmired
applicationslikeinstantmessagingandpushtotalk.Thepresenceserviceiscapabletopoint
outwhethertheotheruserisonlineornotandiftheyareonline,whethertheyarebusyor
idle. In addition the presence service permits user to give details of their communication
means and capabilities. However from a recent study we can see presence service is
responsible for 50% or more of the signaling traffic the IMS core network manages [41].
ThisisprettyatroubleforarealIMSnetworkandshouldbetackled.Inthischapterwewill
analysis the traffic load distribution that NOTIFY messages account for the big part of the
trafficloadonapresenceserver.Wewillstudyamathematicalmodelofaqueuingsystem
with batch arrival and controlled vacation to explain the processing of a NOTIFY message
withinapresenceserver.
A presence service contains four elementary entities [42]: a principle, presentity, watcher
and a presence server (PS) which can be subsist independently or as a part of application
serverslikeIMorPTT.Aprinciplesuggesttoausermaintainedbyapresenceserviceandthe
holder of the presentity; presentity information stand for the principals capability and
eagerness to communicate and rules on how this information is possible to accessed. A
watcher is an entity which requests information from presentity; a presence server is a
network entity which is liable for handling presence information. Figure 4.1 depict three
essentialSIPmethodsclosetothepresenceservice [43][44].theseisSUBCRIBE,PUBLISH
andNOTIFY.Inthefirstoccasionawatchersubscribestoameticulouspresentitythrougha
SUBSCRIBEmethod(SIPmessage).ThePSvalidateseitherthiswatcherauthorizedornotto
subscribetothisparticularpresentity.Ifyesitresponsewitha200OKmethodandsendthe
presentstateofthepresentitytothewatcherthroughaNOTIFYmethod[45].ifapresentity
changesitsstateitusesthePUBLISHmethodtoinformPSofthechange.ThereforethePS
alertsallsubscribed

30

Watchers that the presentitys state change. There is also other way for getting presence
informationforexamplethroughthehomesubscriberserver(HSS).

Presentity

PresenceServer

Watcher

SUBSCRIBE
200 OK
NOTIFY
200 OK
PUBLISH
200 OK
NOTIFY
200 OK

Figure4.1:SIPpresenceservicemessageflow

Formthestandardcallflowofthepresenceserviceasdepictinfigure4.1,wecanseethat
presenceservicecanproducehighamountofsignalingtrafficevenifthereisnoapplication
carrier traffic (e.g. IM, PTT) [41], as one presentity state change will result in several
notificationmessagestowatchers.Atrafficrepresentationforpresenceserviceisofferedin
[41]anditillustratesthatpresenceservicecorrelatedloadonCallSessionControlFunction
(CSCF) could be 50% or more of the whole signaling load it manages. That traffic load has
hugeimpactonIMSnetworkperformanceanditisimportanttocontrolsignalingtrafficload
through different systems [46]. An admission control mechanism is offered to organize
watchers subscription time so that traffic load can be reduced [47]. Whereas reducing
trafficloadisasignificanttechniquetogetbetter

31

Quality of a presence service, activities of components in the service system have more
impact. EndtoEnd delay dimension for IM relay nodes has been studied in [48] and an
optimization model is offered to reduce delay with respect to the relay node throughput,
utilization and buffer volume. Although endtoend delay analysis if presence service is
enviable, it will be very good for operators or PS developers to be familiar with system
behaviorintermsofheavytrafficandthatareperformancebottlenecks.
The operators should be aware of the traffic load distribution and its impact on the
productsperformance,needtoknowmattersinterrelatedwithnetworksizingbeforesetup
serviceandwhatisthebottleneckoftheservice.
Networksizinginveryimportanttomakesurethatadequatebandwidthandresourcesare
obtainabletocarryandprocessmissioncriticaltraffic.FromthealcateLucentstudypaper
[42]wecanseebigportionofthetrafficloadtothePSisgeneratedformNOTIFYmessage,
whichareappliedtoinformthewatcherofapresentitythatpresentityhaschangeitsstatus.
Therefore we study a mathematical model to explain the processing of NOTIFY message
withinthepresenceserver.

4.2SIPpresencearchitecture

Figure4.2illustratetheSIPpresencearchitecture.Wewilldescribethescenarioveryshortly.

Publish

Subscribe
Bob watcher

PUA

`
PUA
Alice
Presentit

Presence Server

PUA

Cynthina
Watcher

Figure4.2:SIPpresencearchitecture
Fromthefigurewecanseethereare fivescenarios.1)Alice presentity2)PAU3)presence
agent4)Bob/Cynthia.Here,

32

Alice is the publisher whose presence information will be published by PAU to the
presenceserver.

PAUistheuserspresenceuseragent.

Presence agent is a presence server which is liable for handling presence


information.

Bob/CynthiaiswatcherwhosubscribefromPStoinformationonAlicespresentity.

4.3Analysisofpresenceservertrafficload

Presenceservicereplicatestheusersupdatestatus;usersbehaviormodelishighlyrelated
with the traffic load to a PS. The logoff/ login time, online behavior, and the number of
contacts everything have great impact on the traffic load to a presence server. Each and
everySIPrequestmessagetoapresenceservercanraisegeneratingatransactionandthe
amount of transactions processed by a SIP server is a key parameter that establishes the
presence server capability [49]. The process fixed cost needed by a presence server to
processtransactionsisdifferent.SupposewhenauserlogsinfirstPUBLISHmessageissent
toapresenceserver,asaresultinsomeauthenticationprocessandtheformationofalatest
SIPtransactiontoorganizesomeinformation;whentheuserchangeshisstateandsendthe
modifyingPUBLISHmessage;thepresenceserversimplyrequiretorecovertheinformation
stored throughout processing of previous transaction and much less overhead in needed.
UseractionsinvokeSIPmessagesasfollowing:

UserLoginandLogout:
A users login creates a first PUBLISH message to the presence server, after that refresh
PUBLISH messages are produced occasionally and lastly a terminating PUBLISH message is
senttothepresenceserverupontheuserslogout.

PresenceSubscription:
Subscription of a user presentity causes in a first SUBSCRIBE message being sent to the
presenceserver.AfterthatrefreshSUBSCRIBEmessageswillbesenttothepresence
Server. A finishing SUBSCRIBE message follows at last to unsubscribe the other users
presentity.

33

PresenceStatusUpdates:
ThechangeofusersstatuseffectsinamodifyingPUBLISHmessage.

Traffic type: Traffic to a presence server is separated in to eight types: initial publish,
refresh publish, modify publish, terminal publish, initial subscribe, refresh subscribe,
terminalsubscribeandnotify[42].Processtimeofeachtraffictypeisdifferent
Fromareferenceimplementation[42]wecanseethatNOTIFYmessagehavehugeimpact
ontrafficloadtoapresenceserveralsototheIMScorenetwork,anditsarrivalratediffer
greatlywiththetimeofaday.SocontrollingNOTIFYmessagealsooptimizingtheirprocess
methodissignificanttoassuranceperformanceofpresenceservers.Inthenextsectionswe
willstudytheNOTIFYmessageprocesssysteminapresenceservertoensureservicequality.

4.4MathematicalAnalysis

In this part we are going to analyze the queuing mechanism of NOTIFY message in a
presence server and calculate performance parameters of the mechanism. A presence
serverstoresitsusersstatusandauserstatuscanbesubscribedbyvariouswatches.Oncea
user has change his status, A PUBLISH message is sent to the presence server and the
presenceserverreplythePUBLISHmessagewitha200okmessage,thenNOTIFYmessage
are programmed to be sent to the all online watcher who have subscribed for this users
status.WecandenotethetotalnumberofwatcherofauserNw andthenumberofonline
watchersforthisusercanbedenotedasnwNw.
Figure4.3showstheprocedurethatwhenausersendsaPUBLISHmessage,andnw NOTIFY
message are generated. Assume that the arrival process of PUBLISH message verifies to
Poisson distribution with parameter p and the PUBLISH message process time verifies to
exponential distribution then form the reference [410], the outgoing process of 200 ok
messageisaswellPoissondistributionwithparameterp.ThearrivalprocedureofNOTIFY
messagesisbatchPoissondistributionbyparameterp.Andbatch
Numbernw.

34

2000K

PUBLISH

NOTIFY

pnw

Figure4.3:PublishandNotifyQueuesinaPS.

Asquickaspossible200okmessagesaresenttotheusertostopmessageretransmission.
ButNOTIFYmessagesarenormallysentperiodicallywithtimeperiodT.becauseofseveral
traffic control requirements. Now we going are sent periodically and if the queue do not
haveanyNOTIFYmessages,theservertostudyqueuingmechanismofNOTIFYmessagesas
ithasagreatimpactonthetrafficloadofapresenceserver.

QueuingSystemwithControlledVacationandBatchPoissonArrival:
From the earlier description, queue of NOTIFY messages can be seen as a queuing system
withcontrolledvacationandbatchPoissonarrival.ThatmeansNOTIFYmessageorganizing
the NOTIFY queue will be on vacation. When the vacation will be finished after the time
interval T, NOTIFY message in the queue will be sent. For all PUBLISH message effects in
multipleNOTIFYmessagestoseparatewatchers,thearrivalproceduretoNOTIFYqueueisin
thebatchofnw.BisthehighestquantityofmessagesthatcanbebufferedNOTIFYqueueand
oncethebufferisfull,arrivingmessagesarediscarded.Wecanmakethestatementsforthe
NOTIFYqueuesystemshowninthefigure4.3.statementsisgivenbelow:
1)NOTIFYmessagesappearatthesystemfollowingtoPoissonprocess,parameterispand
onlyoneserverinthesystem.
2) Service time a NOTIFY message is supposed to be exponentially distributed by mean
1/.intesityoftrafficis=(pnw)/p<1.

35

3) Once the queue turn into empty, the server starts a vacation whose length is
exponentiallydistributedbymeanT=1/.Uponendofavacation,theserverrestartsifthe
queueisnotclear.Orelseittakesanothervacation.
4)Allaforesaidrandomvariablesareindependentofallother

LetS(t)=0andS(t)=1indicatetheeventsthattheserverisbusyandonvacationattimet
correspondingly.Define

Q(t)indicatestheamountofmessagesinthesystemattimetandthemaximumbuffersize
isB.AccordingtoMarkovchaintheoryitfollowsthat{Q(t),S(t),t0}hasuniqueequilibrium
distribution[42].
Setting,

Figure 4.4 describe the state transition graph for the NOTIFY message queue with batch
arrivalandcontrolledvacation.ForthesimplicityofanalysisweassumethatBisdividedby
nw.fromfigure4.4wefindthefollowingstatetransitionequation:

36

(1)

(2)
(3)
(4)
(5)
(6)
(7)

(8)

Theselinearequations(1)to30isindicatedasmodelM.thepropensitysstatusisnoticedto
watchesbynotifymessageanditisunwantedifnotifymessagesaremissingunpredictably
and user get wrong state information. So its very significant to manage queue length of
NOTIFY to control the message loss probability. The probability that a message can arrive
andtherearemorethanKmessageinthebufferis:

37

(1,0)(2,0)(nw,0)(nw+1,0)(nw+2,0)(2nw,0)(Bnw,0)(B,0)

(0,1)(1,1)(2,1)(nw,1)(nw+1,1)(2nw,1).(Bnw,1)(B,1)

Figure4.4:StateTransitionGraphforQueueSystemwithBatchArrivalandControlled
Vacation.

Theprobabilityofthebuffercanbefullis:PB=pB,1+pB,0

Meanofqueuelengthis:

Varianceofqueuelengthis:

38

WithB=100,p=1,nw=4,=6,fromreference[42]wegetp j,0, j=0,.....Bandp j,1, j=1,.....B


for=,1/6,1/10.inthereference[42]figure7givesthedistributionofqueuelengthwith
different vacation interval T=1/. With the longer vacation time, the variation of queue
lengthbecomesbigger.Fromthefigure8inreference[42]wecanseethecalculatedresult
formeanandvarianceofthelengthofqueuealsotheprobabilityofqueuelengthgetbigger
than80%ofthebuffercapacity.Figure8inreference[42]showsthatthelongervacation
time, the longer the queue length, and the larger the probability of queue length greater
than80%B.

This model M is pretty perfect description of the notify message queue but it is a little
complex system like its difficult to get a close form of expression. Its possible to further
study other simple to model to get a control timer value to meet the performance
requirements and we can use Poisson Arrival Process to approximate the Poisson arrival
process of a NOTIFY queue system to have a close form solution of the system state also
parameteroftheNOTIFYqueuesystem.

39

Chapter5
DimensionofaPoCservice

5.1Introduction

ItispossibletoseePushtoTalkasaninstantmessagingwithvoicefacilities.PoCisthefirst
commercialexecutionoftheIMSarchitectureformobilenetwork.PushtoTalkoverCellular
(PoC) is proposed to offer fast communication for business and consumers of mobile
network.PoCwillpermituserdataandvoicecommunicationsharedwithonerecipientthat
isonetooneorbetweengroupsrecipientsthatisonetomany.Suchasinfigure5.1

Figure5.1:ExampleofPoC1tomanyGroupsession(voicetransmission)[54]

Themainfocusofthischapterisfollowing:

40

1. Offering access priority to special sessions that is based on existing RTUs (Transmit/
Receiveunit)
2.OptimizingthesessiontimerforPoCcontroller.
3.Duringbusyhour,optimizethenumberofsessioninitiationforaPoCclient.

We would like to dimension the PoC controller that is based on the hypothesis that is
provided by the network grade of service [51]. By this way PoC server could control PoC
functionalities.

5.2ProposedAccesspriorityModel

ByusagesofGPRSinPoChavetwomainscenarios:
1.Shortinteractivesession(type1)
2.Longsessionwithsporadic,interactivetalkperiods.(Type2)
Themaindifferencebetweentwotalksisthatonecontainschatsessionafteralonginterval
insideasinglesession.Andotheronerequiredtothedistinctsessionsforevery
Stepsneedtobeperformedare:
1.paginginwhichthePoCserverprovidethelocationofthePoCterminalonthecelllevel.
2.CellUpdatebywhichtheterminaltellsthePoCserverinwhichspecificcellitislocated.
3.Radioresourceassignmentmethodsthatarethepartofsessionsetupmethod.
4.PoCsignaling.
Surelythelongsessionwillfavorapreestablishedsessionthanondemandsessionsetup.In
this report we focus the access priority for these two kinds of session set up. Priority is
provided by demand session set up depends on amount of available TRUs. Type 2 (pre
established)sessionsisnotsuitablethroughbusyhourwhereastype1(ondemand)session
is preferable to use any TRU. Let type 2 sessions could use a specific time slot when total
amountofbusyTRUislessthansomeprotectionlevelofnumberb.

41

b+1
0
1
2
b

1+2

Figure5.2:Markovmodelforaccessingsession
Themarkovmodelstatechangewithprobabilitiesisdepictedinfigure5.2.
Here,
K=thenumberofsessionsthatispresentedbyPoCserver1,2.
k= arrivalandservicerateoftype1andtype2sessionsatstatekrespectively.Dependson
theabovemarkovmodewecancalculatetheblockingprobabilityofsessionsandpreferred
thresholdlevel.

5.3ProposedTimer

A usual PoC session should not go beyond 40 second in busy hour [52]. In this part our
purposeistocontrollifetimeofthePoCsessionsforaPoCcontroller.
Define,
q(x)=theprobabilitythatxnumberoftimesaPoCsessiongoesthroughoutatimeslotof
TRUthroughtimeintervalT.
p=theprobabilityofalltimeslotsarebusythroughtheintervalT.
t=atimeslotduration(20ms)
N=totalamountofTRUs
Wefind,

42

P=

(1)

GiventhatasessionisactivethroughtheentireintervalT.thePoissondistributionq(x)is

q(x)=

(2)

AsessioncangothroughanyoftheNTRUsinaPoCserver.So

q(x)<=

( )

(3)

Wegetfromequation(1)and(3)=>

(4)

withthetaylorseries,

(5)

Sowefind,

(6)

43

Fromtheavobeexpressionwecanseeitisclearthattheexpressionoffersarelation
betweenblockingprobabilityandthesessiontimer.

5.4ProposedModeltoOptimizeSimulteniousSessions

In this part our main purpose is to control the amount of simultenious sessions for a PoC
clientthroughrushhour.while,northstreamreportrecommendthatcostanalysisdepends
on time slots of PoC server genarate same outcomes as that of TRUs, we think our next
analysis depends on amount of time slots. Gilberts model have describe that a plain two
statemarkovchaincancalculatepacketlossovertheinternetefficiently.Wewillusesame
concepttocalculatethenumbertheoptimalsessionforaPoCclient.
Thetwostatenaturesoffigure5.3and5.4cancalculatetheburstynatureoftheamountof
simultanioussessionsinrushhour.Figure5.3showsthemodelhastwostateandthatis
blockingorbusyandnotbusy.H1andH2arethetransitionprobabilitesstate[53].

H1
1-H1
1-H2

Not busy
Blocking

H2

Figure5.3:MarkovmodelforPoCserverstates

ThePoCserverreachestoblockingstate0,wheneverychannelsortimeslotsarebusyata
randompointoftimethatispossibletocalculatefromErlangsmethod.Inthisstateamount
ofsessionarrivalintheserverislargerthan5NT.whereNT isthetotalamountoftimeslots.
Supposethatatimeslotsgiveout5PoCsessionsatthesametimeontheaverage.

44

(.7)

Wherea=thetotaltrafficoffered.
Weassume,theservicegradeH2isprovided.Itgoestonotbusystate1.ifthereisonlyone
timeslotisavailableitispossibletocalculatedformBinomialdistribution.Whentheserver
isinthestate0everynewsessionwillbeblocked.Asuccessfulsessionestablishmentisonly
dependsonthecurrentstate.BecauseofthethrottlednatureofthePoCsessions,asession
alterbetweenidleandbusy,thepresentedtrafficpersessionislet,
= total traffic offered
= total arrival rate
= total service rate

(8)

Thestatisticalanalysisdescribesthatthevoiceactivityfactorhasfoundtobe67%[52].
Sowecansaythat33%ofaconversationisinterrupted.
Inthecaseofnonbusystate,

(9)

Thetransitionbetweentwostateshappensateachsessionestablishmentortermination.
Thusinthecaseofsteadystate,
P(0)+P(1)=1

(10)

Thestatetransmissionmatrixisgivenby

45

(11)

ThesessionblockingissameasthestateprobabilityP(0).Inthesamewaytheprobabilityof
successfulsessionestablishmentissametothestateprobabilityP(1).Figure5.4showsthe
natureofasessioninitiationconditionofaPoCclient.StateA
CharacterizesaclientinitiatingonesessionandstateBstandformultiplesessioninitiation.
I1 andI2 arethetransitionprobabilities.TheprobabilitythataPoCclientinitiatesasession
thatisthemeanarrivalrateofaPoCClientandthisis

H1
1-H1
1-H2

Not busy
Blocking
H2

Figure5.4:sessionstatesofaPoCClient

= =

(12)

WhereNcisthenumberofPoCclientsbeingservedbyaPoCserver.

TheprobabilityofasimultaneoussessioninitiationofPoCclientsthroughtheknownperiod
Tcanbemeasuredby
=1Pr

46

(13)

(14)

(15)

Herets=PoCclientssessionlifetime.

P(A)+P(B)=1

ThestatetransitionMatrix:

AsthePoCservergoingtobusystatebasedontotalnumberofsessions,wesuggestto
ConcatenatetwomodelstocalculatethesimultaneoussessionswhichwillleadthePoC
serverfortheoptimalvalue.

47

Chapter6
Conclusionsandfuturework

The development of IP Multimedia Subsystem introduced new multimedia oriented


communication service through cooperating telecom with data on access free IP core
network.Thejunctionofdata,voiceandvideohasenlargedthedemandfortheservicewith
new presentation characteristics. The customer expectation has increased from service
provider due to the new technology. In our thesis we have introduced the queuing
mechanismofNOTIFYmessageinpresenceserverandevaluateitsperformanceparameter.
ThepresenceserverisacentralpartinIMSarchitecture.Thepresenceserverperformanceis
vitalforalmostallapplicationsinIMS.InthisthesisourstudypresentsNOTIFYmessageis
mainly responsible for big portion of traffic load in presence server. Here we have use
mathematical model to describe queue length distribution of NOTIFY message. There are
stilllotsofworkforfurtherstudyhereweonlythinkoneservicepolicybutincaseofreal
systemtherearemanyvariation.
WehavealsoexplaineddifferentoptimalcharacteristicstodimensionaPoCserver.Ifwesee
fromcostpointofview,inthewholeservicedeliverychainoptimizedexpertiserequiredfor
deployment. A service provider can be easily benefited from the models which we have
discussed in chapter 5. Proposed models are finetuned to implement in IP Multimedia
SubsystemstoprovideresourcefulPoCservicetoIMSterminals.Wecanfurtherstudyabout
the case of prioritizing and classifying PoC traffic in expressions of session dropping
probabilities.
In the other area of this thesis explore different model for IMS session set up in mobile
environment, introduction to IMS and basic architecture of IP multimedia subsystems.
ExpansionofIMSarchitectureneedsameticulouschangeintheexistingnetworkofservice
providers. Service provider should be monitor and optimize the network performance to
meet up the assurance levels of service committed to there customers. Service providers
should be model and dimension their network to estimate trends in the network before
deployingit.

48

OurfutureworkcanbefocusonqueuingmechanismforsignalingpartinIMSenvironment
andperformanceevaluationbyusingsimulations.

49

References:

[11]IntroductiontoIPMultimediaSubsystem(IMS),Part1:SOAParlayXWebservicesThe
NextGenerationNetworkarchitectureforTelecomindustry
RebeccaLJChen(rchen@tw.ibm.com),StaffSoftwareEngineer,IBMTaiwan
ElisaCYSu(elisasu@tw.ibm.com),StaffSoftwareEngineer,IBMTaiwan
VictorSCShen(scshen@tw.ibm.com),SoftwareEngineer,IBMTaiwan
YiHongWang(yhwang@tw.ibm.com),SoftwareEngineer,CSDL,IBMTaiwan
[12] The IP Multimedia Subsystem in next generation networks. Gilles Bertrand, may 30
2007
[13]UMTSForum,Rankingoftop3Gservices,UMTSforum,Tech.Rep.,2001
[14] G. Camarillo and M. A. GarciaMartin, The 3GIP Multimedia Subsystem merging the
internetandthecellularworlds.JohnWiley&sons,Ltd,2004.
[15] M. Handley, H. Schulzrinne, E. Schooler, and J. Rosenberg, RFC 2543: SIP: Session
InitiationProtocol,IETF,Tech.Rep.,1999.[Online].Available:www.ietf.org/rfc/rfc2543.txt
[16] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M.
Handley,andE.Schooler,RFC3261:SIP:SessionInitiationProtocol,IETF,Tech.Rep.,2002.
[Online].Available:www.ietf.org/rfc/rfc3261.txt
[17]M.HandleyandV.Jacobson,RFC2327:SDP:SessionDescriptionProtocol,
IETF,Tech.Rep.,1998.[Online].Available:www.ietf.org/rfc/rfc2327.txt
[18]F.Cuervo,N.Greene,A.Rayhan,C.Huitema,B.Rosen,andJ.Segers,RFC3015:
MegacoProtocolVersion1.0,IETF,Tech.Rep.,2000.[Online].Available:
www.ietf.org/rfc/rfc3015.txt
[21]TheimportanceofstandardIMSarchitecture,RakeshKhanDelwalconsultant,andtata
consultancyservicesLimited.
[22] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnson, J. Peterson, R. Sparks, M.
Handley,andE.Schooler.Thesessioninitiationprotocol(SIP)RFC3261.Internet

50

EngineeringTaskForce,2001.
[23]Schulzrinne,H.,Casner,S.,Frederick,R.andV.Jacobson,"RTP:ATransportProtocol
forRealTimeApplications",RFC1889,January1996.
[24] Schulzrinne, H., Rao, R. and R. Lanphier, "Real Time Streaming Protocol (RTSP)", RFC
2326,April1998.
[25] Cuervo, F., Greene, N., Rayhan, A., Huitema, C., Rosen, B. and J. Segers, "Megaco
ProtocolVersion1.0",RFC3015,November2000.
[26] Handley, M. and V. Jacobson, "SDP: Session Description Protocol", RFC 2327, April
1998.
[27] The Internet Engineering Task Force, Network working group. J.Rosenberg,
dynamicsoft,H. Schulzrinne,Columbia U.,G. Camarillo, Ericsson,A. Johnston, WorldCom,J.
Peterson,Neustar,R.Sparks,dynamicsoft,M.Handley,ICIR,E.Schooler,AT&T,June2002
[31]Bradner,S.,"KeywordsforuseinRFCstoIndicateRequirementLevels",BCP14,RFC
2119,March1997.
[32]Durham,D.,Boyle,J.,Cohen,R.,Herzog,S.,Rajan,R.andA.Sastry,"TheCOPS
(CommonOpenPolicyService)Protocol",RFC2748,January2000.
[33]Herzog,S.,Boyle,J.,Cohen,R.,Durham,D.,Rajan,R.andA.Sastry,"COPSusagefor
RSVP",RFC2749,January2000.
[34]Hamer,LN.,Gage,B.,Kosinski,B.andH.Shieh,"SessionAuthorizationPolicy
Element",RFC3520,April2003.
[35]Handley,M.andV.Jacobson,"SDP:sessiondescriptionprotocol,"RFC2327,April
1998.
[36]Rosenberg,J.,Schulzrinne,H.,Camarillo,G.,Johnston,A.,Peterson,J.,Sparks,R.,
Handley,M.andE.Schooler,"SIP:SessionInitiationProtocol",RFC3261,June2002.
[37]Braden,R.,Zhang,L.,Berson,S.,Herzog,S.andS.Jamin,"ResourceReSerVation
protocol(RSVP)version1functionalspecification,"RFC2205,September1997.

[38]Herzog,S.,"RSVPExtensionsforPolicyControl",RFC2750,January2000.

51

[39]Chan,K.,Seligson,J.,Durham,D.,Gai,S.,McCloghrie,K.,Herzog,S.,Reichmeyer,F.,
Yavatkar,R.andA.Smith,"COPSUsageforPolicyProvisioning(COPSPR)",RFC3084,March
2001.
[41] Carlos UrrutiaValds, Amit Mukhopadhyay, and Mohamed ElSayed,Presence and
AvailabilitywithIMS:ApplicationsArchitecture,TrafficAnalysis,andCapacityImpacts,Bell
LabsTechnicalJournal10(4),2006,101107.
[42] IMS Presence Server : Traffic Analysis and Performance Modelling C. Chi Bell
Laboratories, AlcatelLucent chic@alcatellucent.com ,R.Hao Bell Laboratories, Alcatel
Lucent

rbhao@alcatellucent.com

D.Wang

Bell

Laboratories,

AlcatelLucent

wangd@alcatellucent.com , Z. Cao Institute of Information Science Beijing Jiaotong


Universitycaozhenzhen1983@gmail
[43]3rdGenerationPartnershipProject,PresenceServiceBasedonSessionInitiation
Protocol;FunctionalModels,InformationFlowsandProtocolDetails(Release6),3GPPTR
24.841,June2004,<http://www.3gpp.org/ftp/Specs/htmlinfo/24841.htm>.
[44]M.Day,S.Aggarwal,G.Mohr,andJ.Vincent,InstantMessaging/PresenceProtocol
Requirements,IETFRFC2779,Feb.2000,<http://www.ietf.org/rfc/rfc2779.txt?
number=2779>.
[45]A.B.Roach,SessionInitiationProtocol(SIP)SpecificEventNotification,IETFRFC
3265,June2002,<http://www.ietf.org/rfc/rfc3265.txt?number=3265>.
[46]M.Pous,et.al.PerformanceEvaluationofaSIPBasedPresenceandInstantMessaging
ServiceForUMTS,TheInstitutionofElectricalEngineers.254258.
[47] Muhammad T. Alam,Zheng Da Wu, Admission Control Approaches in the IMS
PresenceService,INTERNATIONALJOURNALOFCOMPUTERSCIENCEVOLUME1NUMBER4
2006ISSN13064428,299314.
[48] Muhammad T. Alam,Zheng Da Wu,EndtoEnd Delay Measurement for Instant
MessagingRelayNetworks,<http://epublications.bond.edu.au/infotechpubs/28>.

[49] Henning Schulzrinne, Sankaran Narayanan and Jonathan Lennox, SIPstone


BenchmarkingSIPServerPerformance,<https://developer.ubiquitysoftware.com/

52

support/whitepapers/sipstonebenchmarkingsipserverperformance>
[410]Hayes,JeremiahF.,Chapter7inModelingandAnalysisofComputerCommunications
Networks,1984PlenumPress,NewYork.
[51]KimP.,BalazsA.,BroekE.,KieselmannG.,BohmW.(2005).IMSbasedPushtoTalk
overGPRS/UMTSIEEEWirelessCommunicationsandNetworkingConference,Vol4,pp:
24722477.
[52]ProposedTechniquestoDimensionaPushToTalkoverCellularServer
MuhammadT.Alam_ZhengdaWu
[53]Gilbert,E.N.(1960).Capacityofaburstnoisechannel,BellSyst.Tech.J.,vol.39,pp:
12531265.
[54]OMA,OpenMobileAlliance.PushtotalkoverCellular(PoC)Architecture.
PushtoTalkOverCellularWorkingGroup.2005;URL:
http://www.openmobilealliance.org.

53

AppendixA

IMS

IPMultimediaSubsystem

NGN

NextGenerationNetworking

Abbreviations

3GPP

3rdGenerationPartnershipProject

SIP

SessionInitiatedProtocol

QoS

QualityofService

ToIP

TelephonyoverIP

SDP

SessionDescriptionProtocol

COPS

CommonOpenPolicyService

PIB

PolicyInformationBase

MGCP

MediaGatewayControlProtocol

RTP

RealTimeProtocol

RTCP

RealTimeControlProtocol

CAC

ConnectionAdmissionControl

PoC

PushtoTalkoverCellular

CSCF

CallSession/ControlFunction

HSS

HomeSubscriberServer

AS

ApplicationServer

MRF

MediaResourceFunction

PSTN

PublicSwitchedTelephoneNetwork

BGCF

BreakoutGatewayControlFunction

54

SLF

SubscriberLocationFunction

URI

UniformResourceIdentifier

RSVP

ResourceReservationProtocol

PDP

PolicyDecisionPoint

PS

PolicyServer

ER

EdgeRouter

EH

EndHost

PEP

PolicyEnforcementPoint

RCD

ResourceControlDomain

SCD

ServiceControlDomain

55

AppendixB

Theexplanationofequations,wehavecalculatedfromfigure4.4(StateTransition
GraphforQueueSystemwithBatchArrivalandControlledVacation)arefollowing:

Initially,probabilityofstatep0,1,Equaltoprobabilityofstatep1,0inaPossion
process.

Possiondistributionwithtimevariation.

Whennotifyqueueisfullmessageisdiscarding.

Fromthestatediagram,ForeachPUBLISHmessageresultsinmultipleNOTIFY
messagestodifferentwatchers,thearrivalprocesstoNOTIFYqueueisinthebatch
ofnw.

nw online watchers, nw NOTIFY messages are generated. The arrival process of


NOTIFYmessagesisbatchPoissondistributionwithparameterpandbatch
numbernw

whenqueueisfullthemessagearediscarding.

SummationoftheprobabilityofQueuingSystemwithControlledVacationandBatch
PoissonArrivalisequalto1.

56

You might also like