Title: Accelerating IMS Deployment
1Accelerating IMS Deployment
Gibson Ang Sr. Product Manager
2Carrier Goal Single Common Core
Femtocell
Location
Fixed-Line BAN
Web/Gaming
WLAN
Roaming Subscriber
IP/ Pre-IMS/ IMS/NGN Core
UMA
Video/IPTV
Yo George Sox win again! )
Data/IM
UMTS RAN
3GPP2 RAN
VoIP/PTT
OPERATOR CORE
SUBSCRIBER
SERVICES
ACCESS NETWORKS
3Business Goals
- Remove Silos
- Accelerate Service Rollout
- Increase Subscriber Revenue
- Increased ARPU
- Increased Stickiness
- Beat Competition
Subscriber Generated Growth While Reducing Costs
4Architectural Goals
- FMC
- Mobility - Seamless Roaming
- Single Access-Agnostic Backbone
- Single Location-Agnostic Backbone
- Services
- Single Service-Agnostic Backbone
- Multi-Service
- Service Blending
- IP Enhancements
- Security
- End-to-End QOS
- Charging/Billing
Value Services More than a Bit-Pipe Carrier
5Enhanced Customer Experience
- Personalization
- Location-Aware, Time-Aware, Availability-Aware
- User-Controlled Policies and Account Profiles
- Unification
- Terminals
- Applications
- Socialization
- VoIP Blended Services (Presence, IM)
- Ad-Hoc Social Networking
- Automation
- Contextual Text Messaging
- Contextual Advertising
Customer Experience
The number of worldwide mobile connections is
expected to grow 50 from 2.7 billion in 2006 to
4 billion in 2010. Wireless Intelligence
6IMS Architecture Service Delivery Architecture
7IMS Market Maturity, Demand Drivers and Risk
Factors
8Global Service Revenue
9Growth in IMS Systems Revenue Globally
10IMS Services Goals
Guaranteed Seamless Multi-Service Delivery To
Mobile and Fixed-Line Subscribers
- Integrate different access networks into common
evolving IP, Pre-IMS, IMS, or NGN core network - Allow authenticated subscribers access to
authorized services from any location/network - Deliver End-to-End Per-Flow QoS
- Terminate Secure Tunnels Encrypt/Decrypt
- Fraud Prevention - Prevent Theft of Bandwidth and
Services - Provide DOS Protection to UE and the network
- Serve Lawful Intercept Control, Media, and Data
- NAT for Public lt-gt Private Addressing
- Seamless Mobile IP Roaming
11Operator Challenges to Implementing IMS
- Vendors/Product Availability
- Internal business processes
- Interoperability
- Interfaces from infrastructure to applications
- Integration with legacy networks
- Interconnect agreements
12Security
Application Layer
Attack Layers
Transport Layer
Network Layer
- Malformed packets
- Floods
- DoS attacks
- Hijacking
- Unauthorized access
- Theft of service
- Theft of bandwidth
Revenue Attacks
DoS Attacks
- Mutual Authentication
- IPSec or TLS Encrypted Signaling
- IPSec Encrypted Bearer Data
Secure Access
133G Policy Infrastructure for E2E QoS
Policy Control
Policy Control
Policy Decision
S-PDF
Ia
Ia
C-BGF
A-BGF
Policy Enforcement
14Secure Entry for Untrusted 3rd-Party Applications
3rd-Party IMS Applications
Enterprise Applications
Operator IMS Applications
Web
SIP
Web
SIP
Sh
Multi-Service Gateway Stateful Firewall DOS
Protection Rate-Limiting Per-Flow QoS Aggregate
QoS NAT/NAPT Encrypted Signaling Mirroring CDRs/SD
Rs SIP Overload
AAA- RADIUS
HSS
UE User Equipment P-CSCF Proxy Call and Session
Control Function I-CSCF Interrogating Call and
Session Control Function S-CSCF Serving Call and
Session Control Function HSS Home Subscriber
Server PDF Policy Decision Function Gm Interface
IPsec/SIP Gq Interface Diameter Mw interface
SIP
Multi- Service Gateway
Cx
Cx
ISC
S-CSCF
I-CSCF
Access Network
UE
SIP Signaling
Mw
Mw
P-CSCF
IPSec
Gm
Bearer Plane
15Conclusions
- IMS enables revenue generating services for
Subscriber-Based Growth. Carrier is more than
Bit-Pipe Carrier - IMS reduces costs by removing silos and building
common multi-access core - IMS enhances network for multi-service delivery
16Questions Comments
- gang_at_nextpointnetworks.com