Font Size: a A A

SIP Sever Realization And Security Management Research In IMS

Posted on:2006-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:J N GaoFull Text:PDF
GTID:2168360152476184Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Currently,along with the incresing of communication ability and application, IMS is becoming a hotspot in muti-domain integration. The focus is on the following aspects ,how to integrated mobile network and fixed network in core network. These include hardware , software and network framework which are needed in application. even include secure computation platform.With the trend of network integration, IMS technology is the base of integration between fixed network and mobile network based on IP mechanism, and it is considered to a very important stage in network evolvement. IMS technology has already become universal platform based SIP , so it has to sustain multiplication connection modes, implement integration of fixed network and mobile network.This paper realizes P-CSCF server in IMS following R5 standard, which is comparatively mature as to nowadays. And this paper also focuses on security aspect brought by integration between multi-IMS-domain. The details work include:1) expatiating IMS structure in detail, especially on SIP protocol and related aspects.2) describing SIP protocol structure in IMS and extending IMS requirement of SIP protocol.3) Based on (1) and (2) ,and my work in company,This paper realize the P-CSCF server in IMS.Currently, the organizations to implement IMS are few, and this server is tested within company soft switch products.By it, We can predigest IMS communication system , Also a good roadmap to IMS integration.4) After the research on IMS security requirement and SIP security , this paper advise a MUTI-DOMAIN security scheme ,it has a good deal with UA resource limited ,and security development trend increasing IMS's security adaptability.
Keywords/Search Tags:IMS, network integration, SIP, SAML, SSO, proxyserver, MuIti-Domain security, security negotiation
PDF Full Text Request
Related items