IETF         RFCs         Groups         SIP         Presence         Security         QoS
3GPP         Specs         Glossaries         Architecture         EPC         IMS         subsD         UICC         ETSI

TS 29.228


IMS Cx and Dx Interfaces –
Signalling flows and message contents

TopIndexPrevNext ToCETSI-search3GPP-page 
- - v5.22
53 p.
60 p.
65 p.
73 p.
73 p.
75 p.
79 p.
79 p.
 - - -
after the TSG Plenary Meetings, the 3GPP produces Word documents and afterwards the ETSI publishes the PDF versions
Rapporteur:   BARTOLOME, Maria-Cruz
See also:   IMS-related TS/TR
This TS specifies:
1.The interactions between the HSS (Home Subscriber Server) and the CSCF (Call Session Control Functions), referred to as the Cx interface.
2.The interactions between the CSCF and the SLF (Server Locator Function), referred to as the Dx interface.

The IP Multimedia (IM) Subsystem stage 2 is specified in TS 23.228 and the signalling flows for the IP multimedia call control based on SIP and SDP are specified in TS 24.228.

This document addresses the signalling flows for Cx and Dx interfaces.

This document also addresses how the functionality of Px interface is accomplished. The Presence Service Stage 2 description (architecture and functional solution) is specified in TS 23.141.
full Table of Contents for PDF version:   12.6
except for a few cases, a 3GPP document of a given release is a superset of the same document for the previous release
this ToC shows the evolution of the document according to the releases
 1Scope       p. 7Top
 2References       p. 7Top
 3Definitions, symbols and abbreviations       p. 8
3.1Definitions       p. 8
3.2Abbreviations       p. 9
 4Main Concept       p. 9Top
 5General Architecture       p. 9
5.1Functional requirements of network entities       p. 9
5.1.1Functional requirements of P-CSCF       p. 9
5.1.2Functional requirements of I-CSCF       p. 9
5.1.3Functional requirements of S-CSCF       p. 9
5.1.4Functional requirements of HSS       p. 10
5.1.5Functional classification of Cx interface procedures       p. 10
5.1.6Functional Requirements of the Presentity Presence Proxy
[R6]       p. 10
 6Procedure Descriptions       p. 10
6.1Location management procedures       p. 11
6.1.1User registration status query       p. 11 behaviour       p. 12
6.1.2S-CSCF registration/deregistration notification       p. 14 behaviour       p. 20
6.1.3Network initiated de-registration by the HSS,
administrative       p. 24 behaviour       p. 25
6.1.4User location query       p. 27 behaviour       p. 28
6.2User data handling procedures       p. 30
6.2.1User Profile download       p. 30
6.2.2HSS initiated update of User Information       p. 30 behaviour       p. 31
6.3Authentication procedures       p. 32
6.3.1Detailed behaviour       p. 35
6.4User identity to HSS resolution       p. 36
6.5Implicit registration       p. 37
6.5.1S-CSCF initiated procedures       p. 37       p. 37       p. 37       p. 38 the user profile       p. 38 of a session to a non-registered user       p. 38
6.5.2HSS initiated procedures       p. 38 of User Profile       p. 38       p. 38 of the Charging information       p. 38 of the SIP Digest Authentication Data [R8]       p. 39
6.6Download of the Relevant User Profile and Charging
Information       p. 39
6.6.1HSS initiated update of User Profile       p. 39
6.6.2S-CSCF operation       p. 39
6.7S-CSCF Assignment       p. 39
 7Information element contents       p. 42
7.1Visited Network Identifier       p. 42
7.2Public User Identity       p. 42
7.2aPublic Service Identity [R6]       p. 42
7.2bWildcarded Public Identity [R7]       p. 42
7.2cVoid [R8]
7.3Private User Identity       p. 42
7.3aPrivate Service Identity [R6]       p. 42
7.4S-CSCF Name       p. 42
7.4aAS Name [R6]       p. 42
7.5S-CSCF Capabilities       p. 42
7.6Result       p. 42
7.7User Profile       p. 43
7.8Server Assignment Type       p. 43
7.9Authentication Data       p. 43
7.9.1Item Number       p. 43
7.9.2Authentication Scheme       p. 43
7.9.3Authentication Information       p. 43
7.9.4Authorization Information       p. 43
7.9.5Confidentiality Key       p. 43
7.9.6Integrity Key       p. 43
7.9.7Authentication Context       p. 43
7.9.8Digest Authenticate [R8]       p. 43 Realm       p. 43 Algorithm       p. 44 QoP       p. 44 HA1       p. 44
7.9.9Line Identifier [R8]       p. 44
7.10Number Authentication Items       p. 44
7.11Reason for de-registration       p. 44
7.12Charging information       p. 44
7.13Routing information       p. 44
7.14Type of authorization       p. 44
7.16User Data Already Available       p. 44
7.17Associated Private Identities [R6]       p. 44
7.18Originating-Request [R7]       p. 44
7.19User Authorization Request Flags [R7]       p. 44
7.20Loose-Route Indication [R7]       p. 45
7.21S-CSCF Restoration Information [R8]       p. 45
7.22Associated Registered Private Identities [R8]       p. 45
7.23Multiple Registration Indication [R8]       p. 45
7.24Session-Priority [R8]       p. 45
7.25Identities with Emergency Registration [R8]       p. 45
7.26Priviledged-Sender Indication [R10]       p. 45
7.27LIA Flags [R11]       p. 45
7.28Server Assignment Request Flags [R12]       p. 45
 8Error handling procedures       p. 45
8.1Registration error cases       p. 45
8.1.1Cancellation of the old S-CSCF       p. 46
8.1.2Error in S-CSCF name       p. 46
8.1.3Error in S-CSCF assignment type       p. 46
 9Protocol version identification       p. 46Top
 10Operational Aspects       p. 47Top
Annex A[N]Mapping of Cx operations and terminology to Diameter       p. 48
A.1Introduction       p. 48
A.2Cx message to Diameter command mapping       p. 48
A.3Cx message parameters to Diameter AVP mapping       p. 48
A.4Message flows       p. 49
A.4.1Registration– user not registered       p. 50
A.4.2Registration – user currently registered       p. 51
A.4.3UE initiated de-registration       p. 51
A.4.4Network initiated de-registration       p. 52
A.4.4.1Registration timeout       p. 52
A.4.4.2Administrative de-registration       p. 52
A.4.4.3De-registration initiated by service platform       p. 53
A.4.5UE Terminating SIP session set-up       p. 53
A.4.6Initiation of a session to a non-registered user       p. 54
A.4.6aAS originating session on behalf of a non-registered user
[R7]       p. 54
A.4.7User Profile update       p. 55
Annex BUser profile UML model       p. 56
B.1General description       p. 56
B.2Service profile       p. 56
B.2.1Public Identification       p. 57
B.2.1ACore Network Service Authorization [R7]       p. 58
B.2.2Initial Filter Criteria       p. 59
B.2.3Service Point Trigger       p. 61
Annex CConjunctive and Disjunctive Normal Form       p. 63Top
Annex DHigh-level format for the User Profile       p. 66Top
Annex E[N]XML schema for the Cx interface user profile       p. 67Top
Annex F[N]Definition of parameters for service point trigger matching       p. 74Top
Annex G[N]Emergency registrations [R7]       p. 75Top
Annex H[N]Diameter overload control mechanism [R12]       p. 76
H.1General       p. 76
H.2HSS behaviour       p. 76
H.3I/S-CSCF behaviour       p. 76
Annex IDiameter overload node behaviour [R12]       p. 77
I.1Message prioritization       p. 77
Annex JChange history       p. 78Top