IETF         RFCs         Groups         SIP         Presence         Security         QoS
3GPP         Specs         Glossaries         Architecture         EPC         IMS         subsD         UICC         ETSI

TS 29.228


IMS Cx and Dx Interfaces –
Signalling flows and message contents

Top Index Prev Next   ToC ETSI-search 3GPP-page 
-  -  v5.22
53 p.
60 p.
65 p.
73 p.
73 p.
75 p.
79 p.
79 p.
  -  -  -
after the TSG Plenary Meetings, the 3GPP produces Word documents and afterwards the ETSI publishes the PDF versions
Rapporteur:   BARTOLOME, Maria-Cruz
See also:   IMS-related TS/TR
This TS specifies:
1. The interactions between the HSS (Home Subscriber Server) and the CSCF (Call Session Control Functions), referred to as the Cx interface.
2. The interactions between the CSCF and the SLF (Server Locator Function), referred to as the Dx interface.

The IP Multimedia (IM) Subsystem stage 2 is specified in TS 23.228 and the signalling flows for the IP multimedia call control based on SIP and SDP are specified in TS 24.228.

This document addresses the signalling flows for Cx and Dx interfaces.

This document also addresses how the functionality of Px interface is accomplished. The Presence Service Stage 2 description (architecture and functional solution) is specified in TS 23.141.
full Table of Contents for PDF version:   12.6
except for a few cases, a 3GPP document of a given release is a superset of the same document for the previous release
this ToC shows the evolution of the document according to the releases
 1 Scope       p. 7Top
 2 References       p. 7Top
 3 Definitions, symbols and abbreviations       p. 8
3.1 Definitions       p. 8
3.2 Abbreviations       p. 9
 4 Main Concept       p. 9Top
 5 General Architecture       p. 9
5.1 Functional requirements of network entities       p. 9
5.1.1 Functional requirements of P-CSCF       p. 9
5.1.2 Functional requirements of I-CSCF       p. 9
5.1.3 Functional requirements of S-CSCF       p. 9
5.1.4 Functional requirements of HSS       p. 10
5.1.5 Functional classification of Cx interface procedures       p. 10
5.1.6 Functional Requirements of the Presentity Presence Proxy
[R6]       p. 10
 6 Procedure Descriptions       p. 10
6.1 Location management procedures       p. 11
6.1.1 User registration status query       p. 11 Detailed behaviour       p. 12
6.1.2 S-CSCF registration/deregistration notification       p. 14 Detailed behaviour       p. 20
6.1.3 Network initiated de-registration by the HSS,
administrative       p. 24 Detailed behaviour       p. 25
6.1.4 User location query       p. 27 Detailed behaviour       p. 28
6.2 User data handling procedures       p. 30
6.2.1 User Profile download       p. 30
6.2.2 HSS initiated update of User Information       p. 30 Detailed behaviour       p. 31
6.3 Authentication procedures       p. 32
6.3.1 Detailed behaviour       p. 35
6.4 User identity to HSS resolution       p. 36
6.5 Implicit registration       p. 37
6.5.1 S-CSCF initiated procedures       p. 37 Registration       p. 37 De-registration       p. 37 Authentication       p. 38 Downloading the user profile       p. 38 Initiation of a session to a non-registered user       p. 38
6.5.2 HSS initiated procedures       p. 38 Update of User Profile       p. 38 De-registration       p. 38 Update of the Charging information       p. 38 Update of the SIP Digest Authentication Data [R8]       p. 39
6.6 Download of the Relevant User Profile and Charging
Information       p. 39
6.6.1 HSS initiated update of User Profile       p. 39
6.6.2 S-CSCF operation       p. 39
6.7 S-CSCF Assignment       p. 39
 7 Information element contents       p. 42
7.1 Visited Network Identifier       p. 42
7.2 Public User Identity       p. 42
7.2a Public Service Identity [R6]       p. 42
7.2b Wildcarded Public Identity [R7]       p. 42
7.2c Void [R8]
7.3 Private User Identity       p. 42
7.3a Private Service Identity [R6]       p. 42
7.4 S-CSCF Name       p. 42
7.4a AS Name [R6]       p. 42
7.5 S-CSCF Capabilities       p. 42
7.6 Result       p. 42
7.7 User Profile       p. 43
7.8 Server Assignment Type       p. 43
7.9 Authentication Data       p. 43
7.9.1 Item Number       p. 43
7.9.2 Authentication Scheme       p. 43
7.9.3 Authentication Information       p. 43
7.9.4 Authorization Information       p. 43
7.9.5 Confidentiality Key       p. 43
7.9.6 Integrity Key       p. 43
7.9.7 Authentication Context       p. 43
7.9.8 Digest Authenticate [R8]       p. 43 Digest Realm       p. 43 Void Digest Algorithm       p. 44 Digest QoP       p. 44 Digest HA1       p. 44
7.9.9 Line Identifier [R8]       p. 44
7.10 Number Authentication Items       p. 44
7.11 Reason for de-registration       p. 44
7.12 Charging information       p. 44
7.13 Routing information       p. 44
7.14 Type of authorization       p. 44
7.15 Void
7.16 User Data Already Available       p. 44
7.17 Associated Private Identities [R6]       p. 44
7.18 Originating-Request [R7]       p. 44
7.19 User Authorization Request Flags [R7]       p. 44
7.20 Loose-Route Indication [R7]       p. 45
7.21 S-CSCF Restoration Information [R8]       p. 45
7.22 Associated Registered Private Identities [R8]       p. 45
7.23 Multiple Registration Indication [R8]       p. 45
7.24 Session-Priority [R8]       p. 45
7.25 Identities with Emergency Registration [R8]       p. 45
7.26 Priviledged-Sender Indication [R10]       p. 45
7.27 LIA Flags [R11]       p. 45
7.28 Server Assignment Request Flags [R12]       p. 45
 8 Error handling procedures       p. 45
8.1 Registration error cases       p. 45
8.1.1 Cancellation of the old S-CSCF       p. 46
8.1.2 Error in S-CSCF name       p. 46
8.1.3 Error in S-CSCF assignment type       p. 46
 9 Protocol version identification       p. 46Top
 10 Operational Aspects       p. 47Top
Annex A [N] Mapping of Cx operations and terminology to Diameter       p. 48
A.1 Introduction       p. 48
A.2 Cx message to Diameter command mapping       p. 48
A.3 Cx message parameters to Diameter AVP mapping       p. 48
A.4 Message flows       p. 49
A.4.1 Registration– user not registered       p. 50
A.4.2 Registration – user currently registered       p. 51
A.4.3 UE initiated de-registration       p. 51
A.4.4 Network initiated de-registration       p. 52
A.4.4.1 Registration timeout       p. 52
A.4.4.2 Administrative de-registration       p. 52
A.4.4.3 De-registration initiated by service platform       p. 53
A.4.5 UE Terminating SIP session set-up       p. 53
A.4.6 Initiation of a session to a non-registered user       p. 54
A.4.6a AS originating session on behalf of a non-registered user
[R7]       p. 54
A.4.7 User Profile update       p. 55
Annex B User profile UML model       p. 56
B.1 General description       p. 56
B.2 Service profile       p. 56
B.2.1 Public Identification       p. 57
B.2.1A Core Network Service Authorization [R7]       p. 58
B.2.2 Initial Filter Criteria       p. 59
B.2.3 Service Point Trigger       p. 61
Annex C Conjunctive and Disjunctive Normal Form       p. 63Top
Annex D High-level format for the User Profile       p. 66Top
Annex E [N] XML schema for the Cx interface user profile       p. 67Top
Annex F [N] Definition of parameters for service point trigger matching       p. 74Top
Annex G [N] Emergency registrations [R7]       p. 75Top
Annex H [N] Diameter overload control mechanism [R12]       p. 76
H.1 General       p. 76
H.2 HSS behaviour       p. 76
H.3 I/S-CSCF behaviour       p. 76
Annex I Diameter overload node behaviour [R12]       p. 77
I.1 Message prioritization       p. 77
Annex J Change history       p. 78Top