FYI, 3GPP specifications can be downloaded from web site. http://www.3gpp.org/specs/numbering.htm
Basically, fundamentals of the IMS specifications of 3GPP are in : stage 1 / Services & scopes : 22 series. stage 2 / Architecture : 23 series. stage 3 / Signalling : 24 series. TS24.228 (24 series) This document gives examples of signalling flows for the IP multimedia call control based on SIP and SDP. TS24.229 (24 series) This document defines a call control protocol for use in the IMS based on SIP and SDP. Best Regards, On Thu, 5 Jul 2007 14:30:49 -0700 "Dutt Kalapatapu" <[EMAIL PROTECTED]> wrote: > > Here is the meaning described in 3GPP. There are the headers used in > IMS network. > > From: From is used for display purpose only. It is not used for billing > or any such purpose. Also, this doesn't identify the user; it only > identifies the display name that he/she wish to present to the other > user. > > P-Preferred: When user has multiple Public identities, he could have > different services for each identity. For example: A subscriber user1 > has two identities, [EMAIL PROTECTED] and [EMAIL PROTECTED] He could > choose any identity so that proper billing can be done. This Preferred > identity is sent in the INVITE and other intial methods to the Proxy > CSCF. The identities of the user will be notified at the REGISTER time > in the P-Associated-URI of the 200 OK response of the REGISTER. > > P-Asserted: Once the P-CSCF validates the user, based on security and > certificates, P-CSCF asserts the user by converting the P-Preferred to > P-Asserted. Assertion signifies that the other proxy/CSCF/AS servers > that the user is what he said he is. If the P-CSCF could not assert the > user then S-CSCF (Serving CSCF) can authenticate the user using 407 > challenge. Also P-Asserted identifies the subscriber and the services > that needs to be rendered. This is never set to anonymous like From. > This also gives the network to run proper services when user makes an > anonymous call. The display is anonymous but the user is clearly > identified using P-Asserted. > > Hope this clarifies. > > -Dutt > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > [EMAIL PROTECTED] > Sent: Wednesday, July 04, 2007 5:25 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Re: [Sip-implementors] Privacy and P-asserted Identity headers > > > Hi Varun, > > To my knowledge p-asserted Identity and privacy go together > p-asserted Identity is used for call ID display but based on Privacy > level > Present in the privacy header. > > Regards > Sunil Verma > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > varun > Sent: Wednesday, July 04, 2007 4:24 PM > To: varun; [EMAIL PROTECTED] > Subject: Re: [Sip-implementors] Privacy and P-asserted Identity headers > > Could somebody reply please~! > > --- varun <[EMAIL PROTECTED]> wrote: > > > Hi, > > I tried to understand the use of privacy and > > P-asserted Identity headers in SIP but not really > > clear about these. > > Could somebody explain in simple terms the use of > > these two headers. > > > > Need this info ASAP, would be really helpful if > > somebody could reply. > > > > > > Regards > > varun ------ YOSHIKAWA Tomoyuki <[EMAIL PROTECTED]> NEXT GENERATION NETWORK STRATEGY RESEARCH AND DEVELOPMENT CENTER NETWORK BUSINESS HEADQUARTERS NTT EAST TEL: +81-3-5359-5104 ; FAX: +81-3-5359-1236 _______________________________________________ Sip-implementors mailing list [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
