US20090207828A1 - Transparent session initiated protocol - Google Patents
Transparent session initiated protocol Download PDFInfo
- Publication number
- US20090207828A1 US20090207828A1 US12/433,318 US43331809A US2009207828A1 US 20090207828 A1 US20090207828 A1 US 20090207828A1 US 43331809 A US43331809 A US 43331809A US 2009207828 A1 US2009207828 A1 US 2009207828A1
- Authority
- US
- United States
- Prior art keywords
- proxy
- domain
- communication
- sip
- invite
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 claims abstract description 47
- 238000000034 method Methods 0.000 claims abstract description 35
- 230000000977 initiatory effect Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 15
- 230000004044 response Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 238000007796 conventional method Methods 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 102220495430 Glutaredoxin-like protein C5orf63_S12A_mutation Human genes 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- GVVPGTZRZFNKDS-JXMROGBWSA-N geranyl diphosphate Chemical compound CC(C)=CCC\C(C)=C\CO[P@](O)(=O)OP(O)(O)=O GVVPGTZRZFNKDS-JXMROGBWSA-N 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/08—Upper layer protocols
- H04W80/10—Upper layer protocols adapted for application session management, e.g. SIP [Session Initiation Protocol]
Definitions
- the present invention relates to session initiation protocol (SIP) in a communication system and, in particular, to an apparatus and method for significantly reducing the number of interfaces required between caller and called agents.
- SIP session initiation protocol
- a typical SIP scenario involves one or more proxy/re-direct servers as shown in FIG. 1 .
- the “trapezoidal” arrangement shown therein includes a caller (UA 1 ) entity and a called (UA 2 ) entity.
- the UA 1 caller may be anyone of a variety of user equipments (UEs) such as a properly equipped laptop, PDA, wireless cell phone capable of transmitting and receiving data as well as voice, and so forth.
- UEs user equipments
- PDA personal area network
- wireless cell phone capable of transmitting and receiving data as well as voice, and so forth.
- One important SIP feature is the ability to invite new participants to a call.
- a user is identified in SIP using an SIP uniform resource identifier (URI) which may, for example, be UA 1 at Domain (A).
- the Domain (A) server, Proxy 1 determines an SIP server for Domain (B), in this case, Proxy 2 , using directory name service (DNS) procedures.
- DNS directory name service
- control signals are communicated as illustrated by control signal lines CS via the proxy servers while the media content is shared as illustrated by media line MS.
- the servers in the operators network are used to provide access to the third party application servers.
- the network operator controls the use of these servers and as a result, also controls access to the third party application servers.
- the present invention enhances access to third party application servers from user devices attached to operator networks and also provides the ability to increase the revenue stream for those services to the third party providers.
- the objective of the present invention is to address scenarios where SIP is employed for contacting a third party application or content server transparently.
- the motivation behind this invention is the provision of a transparent means of network traversal to access third party application and content servers located outside of the operators' network.
- the present invention provides for the utilization of “smart” SIP Proxy Agent Middleware (SPAM) which are preferably integrated into user devices.
- SIP Proxy Agent Middleware which are preferably integrated into user devices.
- all user agents (UAs) in a user device are configured with SPAM as an outbound proxy.
- a User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests.
- a user device refers to a physical communication device such as a mobile phone, PDA, laptop or other type of network connectable communication device. There can be more than one User Agent in a user device at any instant of time.
- the address of the SIP proxy server which is illustrated in the Figures as Proxy 1 in Domain A
- the address of the internal domain which is the network operator's domain i.e. Domain A
- SPAM preferably determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain.
- FIG. 1 is a overview diagram illustrating a conventional SIP scenario employing two proxy/re-direct servers.
- FIG. 2 is a simplified diagram utilizing the method and apparatus of the present invention for accessing a third party application server.
- FIG. 3 is a detailed flow diagram of a transparent SIP for external domains in accordance with the present invention.
- FIG. 4 is a detailed flow diagram of a SIP employed for internal domains.
- FIG. 5 is a simplified diagram of both the conventional technique and the technique of the present invention employing a transparent SIP in a wireless local area network (WLAN).
- WLAN wireless local area network
- FIGS. 6A and 6B show flow diagrams of conventional Proxy-call state control function (P-CSCF) discovery using dynamic host configuration protocol (DHCP) and directory name service (DNS) and using packet data protocol (PDP) context activation signaling respectively.
- P-CSCF Proxy-call state control function
- DHCP dynamic host configuration protocol
- DNS directory name service
- PDP packet data protocol
- FIG. 7 is a flow diagram of a conventional mobile originating network with service based local policy and without resource reservation protocol (RRP) for general packet radio service (GPRS) procedures.
- RRP resource reservation protocol
- GPRS general packet radio service
- FIG. 8 is a simplified diagram of the employment of transparent SIP in third generation (3G) networks.
- FIG. 9 is a flow diagram of a mobile switching center transparent SIP for external domains.
- FIG. 10 is an illustration of an example user device made in accordance with the teaching of the present invention.
- the present invention provides method and apparatus which employ an improved session initiation protocol (SIP) for transparently contacting third party applications or content servers.
- SIP session initiation protocol
- a transparent means of network traversal is provided to access to third party application and content servers located outside of the operator's network.
- SIP proxy agent middleware is provided in user devices which are conveniently referred to as User Equipments (UEs).
- UEs User Equipments
- all user agents (UAs) in a UE are manually configured with SPAM as an outbound proxy.
- a User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests.
- a User Equipment (UE) refers to the physical user device such as a mobile phone, PDA, laptop or other type of network connectable communication device which may serve as an SIP terminal. There can be more than one User Agent in a UE at any instant of time.
- the address of the SIP proxy server which, for the example illustrated in FIG. 1 , is the proxy server in a domain A, and an internal domain which is the network operator's domain, are provided to SPAM.
- SPAM determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain.
- SPAM determines the SIP server of the external domain by, for example, identifying the IP address, port and transport protocol for the external domain's proxy server, such as Proxy 2 in Domain B illustrated in FIGS. 1 and 2 , by performing a directory name service (DNS) lookup.
- DNS directory name service
- the request is sent to the SIP proxy server, Proxy 1 in Domain A specified by the operator, wherein internal services provided are obtained in a conventional manner.
- SPAM when external services are desired, SPAM provides the SIP uniform resource identifier (URI) for UA 1 in the form of a numerical internet protocol (IP) address of an SIP terminal, for instance UA 1 , at 162.178.9.6, in which the internal domain proxy server, Proxy 1 of Domain A, is omitted when performing SIP transactions.
- This architecture is utilized when the SIP terminal, i.e. UA 1 , initiates a call to a third party application/content server. More specifically, in the example of FIG. 2 , UA 1 utilizes the SIP URI for Proxy 2 of Domain B in order to access services from content server UA 2 .
- the control communications links between UA 1 , Proxy 2 and UA 2 are identified as CS, the media communication link which is established is illustrated as MS. Accordingly, SPAM enables the SIP terminal, UA 1 to bypass Proxy 1 of Domain A.
- FIGS. 3 and 4 show a flow diagram of a user device employing transparent SIP for communication with external domains.
- UA 1 and SPAM are illustrated separately in FIGS. 3 and 4 , preferably they are both implemented in the physical user device employed as the SIP terminal acting as “caller.”
- UA 1 sends an invitation signal, Invite, to SPAM.
- SPAM then identifies the Invite as an external domain.
- a preferred procedure for the case where SPAM identifies the Invite as a request for internal services is illustrated in FIG. 4 .
- a DNS lookup is performed by SPAM, such as by SPAM accessing a DNS Server via Proxy 1 .
- SPAM accessing a DNS Server via Proxy 1 .
- an Invite from SPAM is communicated to Proxy 2 .
- SPAM preferably reports a 100 “trying” communication to UA 1 .
- Proxy 2 responsive to the Invite from SPAM, communicates, at step S 4 , an Invite signal to a called third party application server, in this case UA 2 .
- Proxy 2 also sends a 100 “trying” communication to SPAM which may be relayed to UA 1 .
- UA 2 responsive to the Invite (step S 4 ), preferably sends a 180 Ringing communication to Proxy 2 at step S 6 , which, at step S 7 , preferably sends a 180 Ringing communication to SPAM which, in turn preferably sends a 180 Ringing communication to UA 1 , at step S 8 .
- Acceptance of the Invite (step S 4 ) by UA 2 preferably results in a 200 OK message, at step S 9 , which is communicated to Proxy 2 .
- Proxy 2 then, at step S 10 , sends a 200 OK communication to SPAM, which, in turn, sends a 200 OK communication to UA 1 , at step S 11 .
- UA 1 sends an acknowledgement (ACK) directly to UA 2 , at step S 12 , whereupon a Media session is initiated at step S 12 A via a conventional link that bypasses the proxy servers.
- ACK acknowledgement
- UA 2 Upon completion of the media session, UA 2 sends a BYE communication to UA 1 , at step S 13 whereupon UA 1 , at step S 14 , responds with a 200 OK communication to UA 2 .
- Such session termination corresponds with conventional techniques; by definition SIP are protocols which are directed to the control of session initiation.
- FIG. 4 is a flow diagram of a preferred method of employing SIP for internal domains wherein UA 1 , at step S 1 , sends an invitation signal, Invite, to SPAM which, at step S 1 A, SPAM identifies the Invite as being directed to an internal domain.
- SPAM sends an Invite to Proxy 1 , and preferably, at step S 3 , sends a 100 Trying communication to UA 1 .
- Proxy server, Proxy 1 may be the server which controls the provision of the requested internal service, in which case Proxy 1 continues by directly contacting the “called entity” within the common Domain.
- Proxy 2 controls the “called entity” UA 2 which provides the desired internal services
- Proxy 1 responsive to the Invite (step S 2 ), performs a DNS lookup, at step S 2 A, and sends an Invite to Proxy 2 , at step S 4 , and further sends a 100 Trying communication to SPAM, at step S 5 .
- Proxy 2 responsive to the Invite (step S 4 ), sends an Invite to UA 2 , at step S 6 and sends a 100 trying communication to Proxy 1 , at step S 7 .
- UA 2 and Proxy 2 are in same domain as UA 1 and Proxy 1 .
- the UA 2 sends a 180 Ringing communication to Proxy 2 which responds by sending a 180 Ringing communication to Proxy 1 , at step S 9 , Proxy 1 responding thereto by sending a 180 Ringing communication to SPAM, at step S 10 .
- SPAM at step S 11 , sends a 180 Ringing communication to UA 1 .
- UA 2 Upon acceptance of the Invite (step S 6 ), UA 2 sends a 200 OK communication to Proxy 2 , at step S 12 , Proxy 2 sending a 200 OK communication to Proxy 1 , at step S 13 , and SPAM receiving 200 OK from Proxy 2 at step S 14 , responding thereto by sending a 200 OK to UA 1 , at step S 15 .
- UA 1 responds to the 200 OK by sending an Acknowledgement (ACK) to UA 2 , at step S 16 , and a Media session between UA 1 and UA 2 is set up, at step S 16 A.
- ACK Acknowledgement
- UA 2 When a session is completed, UA 2 , at step S 17 , sends a BYE to UA 1 which responds with a 200 OK communication to UA 2 , at step S 18 .
- the user devices which are configured with the SPAM associated with UAs may be configured for operation within either a wired or wireless embodiment.
- the user device may take the form of a wireless transmit receive unit (WTRU) configured for use in a wireless network such as a wireless local area network (WLAN) employing one or more of the IEEE 802 family of standards or a Universal Mobile Telecommunications Systems (UMTS) employing code division multiple access (CDMA).
- WTRU includes but is not limited to a user equipment (UE), mobile station, fixed or mobile subscriber unit, pager, or any other type of device capable of operating in a wireless environment.
- FIG. 5 is a simplified diagram comparing the conventional SIP technique with the SIP Transparent technique of the present invention in which transparent SIP is utilized in a wireless local area network (WLAN), for example.
- the conventional control technique is illustrated as a dotted line denoted original control and shows UA 1 communicating via an access point (AP) of a WLAN at CC 1 .
- the AP in turn communicates via Proxy 1 at CC 2 .
- Proxy 1 communicates via an internet protocol (IP) backbone with Proxy 2 at CC 3 .
- Proxy 2 communicates with the third party application/content server UA 2 at CC 4 .
- IP internet protocol
- Modified Control that shows UA 1 communicates with the UA 2 through the AP, IP backbone and Proxy 2 as indicated by the modified control links MC 1 , MC 2 and MC 3 .
- the content services provided from UA 2 through the IP backbone and the AP to UA 1 is shown by the heavy line media connection MM 1 , MM 2 .
- Proxy 1 is bypassed due to the use of the transparent SIP in the WLAN for SIP call control flow.
- a UE performs a general packet radio service (GPRS) Attach, performing a PDP context activation procedure, at step S 1 , which step is conducted with a Proxy-call state control function (P-CSCF) to a Gateway GPRS Support Node (GGSN).
- GPRS general packet radio service
- An address is obtained using a dynamic host configuration protocol (DHCP) procedure, utilizing DHCP and DNS queries, which take place between the UE and the GGSN, and the GGSN and a DHCP server, as shown at step S 2 .
- the DSN query/response takes place in a communication between the UE and a DNS server, at step S 3 , which steps are conventional.
- DHCP dynamic host configuration protocol
- FIG. 6B shows the manner in which the procedure for P-CSCF discovery is employed using an activate PDP context request. More particularly, the UE at step S 1 , activates the PDP context request. Responsive thereto, the GGSN at step S 2 creates a PDP context request which is communicated to the DHCP server. The DHCP server at step S 3 , obtains IP addresses of P-CSCF(s). A PDP context response is created by the DHCP server and communicated to the GGSN, at step S 4 which, in turn, provides an activate PDP context accept and communicates this to the UE, at step S 5 .
- FIG. 7 shows an example of General Packet Radio Service (GPRS) and Common Open Policy Service (COPS) interactions during a session setup when a service based local policy (SBLP) is applied.
- FIG. 7 shows a conventional mobile originating network example, such as specified in 3GPP Technical Specification 24.228 V5.6.0 (2003-09). Since a serving CSCF (S-CSCF) is not involved in the GPRS interaction it has been omitted from the flow diagram, but it is assumed that a serving CSCF (S-CSCF) or interrogating CSCF (I-CSCF) is the next entity in the signaling flow and is referred to as a “next entity” in the example as explained below.
- S-CSCF serving CSCF
- I-CSCF interrogating CSCF
- the GPRS comprises part of a Universal Mobile Telecommunications System (UMTS) access system for UEs configured for use in such a 3G system.
- UMTS Universal Mobile Telecommunications System
- S-CSCF IP Multi-Media Core Network
- CN IP Multi-Media Core Network
- a UE communicates an Invite to a P-CSCF, operating as a Policy Decision Function (PDF).
- PDF Policy Decision Function
- the P-CSCF sends a 100 trying communication to the UE and, at step S 3 , sends an Invite to the next entity.
- the next entity at step S 4 , sends a 100 trying communication to the P-CSCF and, at step S 5 , the next entity sends a 183 session progress communication to the P-CSCF.
- the P-CSCF authorizes the Quality of Service (QoS) resources and, at step S 7 , sends a 183 session progress signal to the UE.
- QoS Quality of Service
- the UE responsive to step S 7 , sends, at step S 8 an acknowledgement signal (PRACK) to the P-CSCF which, at step S 9 , relays the PRACK to the next entity.
- PRACK acknowledgement signal
- SIP defines two types of responses, provisional and final.
- Final responses convey the result of the request processing, and are sent reliably.
- Provisional responses provide information on the progress of the request processing, but are not sent reliably in RFC 3261. It has been observed that reliability is important in several cases, including interoperability scenarios with a Public Switch Telephone Network (PSTN). Therefore, an optional capability was needed to support reliable transmission of provisional responses. That capability is provided by PRACK (refer RFC 3262).
- Reliable responses are retransmitted by the Transaction User (TU) with an exponential backoff. Those retransmissions cease when a PRACK message is received.
- the PRACK request plays the same role as ACK, but for provisional responses.
- the next entity sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S 11 .
- the UE sends a GPRS: ACTIVATE PDP context to a Serving GPRS Support Node (SGSN) which, at step S 13 , sends a GPRS create PDP context to a GGSN, which, at step S 14 sends a COPS: request (REQ) activate PDP context to the P-CSCF, which, responsive to step S 14 , sends a COPS:DEC policy information communication to the GGSN, at step S 15 .
- SGSN Serving GPRS Support Node
- REQ COPS: request
- the GGSN sends a COPS:RPT activate PDP context to the P-CSCF and, at step S 17 , the GGSN sends a GPRS: create PDP response to the SGSN, which, responsive to step S 17 , sends a GPRS:ACTIVATE PDP context accept to the UE, at step S 18 .
- the UE sends an update to the P-CSCF which relays this to the next entity, at step S 20 .
- the next entity, at step S 21 sends a 200 OK update to the P-CSCF which relays this message to the UE, at step S 22 .
- the next entity, at step S 23 also sends a 180 ringing message to the P-CSCF which relays this message to the UE, at step S 24 .
- the UE, at step S 25 sends an PRACK to the P-CSCF which relays this message to the next entity, at step S 26 .
- the next entity, at step S 27 sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S 28 .
- PRACK 200 OK
- the next entity sends a 200 OK (INVITE) to the P-CSCF which, at step S 30 , sends a COPS:DEC (open “gate”) to the GGSN.
- the GGSN at step S 31 , sends a COPS:RPT (report outcome) to the P-CSCF, which sends a 200 OK (INVITE) to the UE, at step S 32 .
- the UE sends an ACK to the P-CSCF, at step S 33 , which conveys the ACK message to the next entity, at step S 34 .
- FIG. 8 shows a 3G Network in which a conventional control path is shown by dotted line C 1 denoted Original Control and a control path in accordance with the present invention is shown by thin solid line C 2 denoted modified Control.
- the media path for both cases is illustrated by heavy solid line M.
- UA 1 interacts with the UMTS access components (which includes the Radio Network Subsystem (RNS), SGSN, GGSN), the IP Multi-Media CN Subsystem (IMS) (which includes the P-CSCF, I-CSCF, S-CSCF) in order to establish a control path via the Internet between UA 1 and the proxy server, PROXY 2 , and the third party application/content server in the third party domain.
- RNS Radio Network Subsystem
- IMS IP Multi-Media CN Subsystem
- the IP Multi-Media CN Subsystem (IMS) is omitted from the control path and the UA 1 communicates directly with the PROXY 2 and third-party application/content server employing only the RNS, SGSN and GGSN UMTS access components.
- the media path M remains the same using the conventional control technique for the transparent SIP technique.
- FIG. 9 is a flow-diagram illustrating an example of the transparent SIP technique for external domains employed in a 3G system in which preferably the user agent UA 1 and SPAM are implemented in a UE configured for use in a 3G system.
- SPAM could be embodied in one of the UMTS access components.
- UA 1 at step S 1 , sends an Invite to SPAM which, at step S 1 A, identifies the third party application/server (UA 2 ) as being located in an external domain and, at step S 1 B, invokes a GPRS attach.
- the SPAM at step S 1 C, establishes PDP context bearer by using a PDP context establishment procedure, which is conventional, and is described at 3GPP TS 24.008.
- ACT in step S 1 C stands for “PDP Context Activation Procedure.”
- SPAM performs a DNS lookup, and identifies IP address, port and transport protocol for Proxy 2 in external domain B, by communicating with a DNS server.
- the SPAM at step S 1 E, then establishes a packet switched (PS) call to Proxy 2 in Domain B. Thereafter, the remaining steps S 2 through S 14 are conducted between UA 1 , Proxy 2 and UA 2 are substantially identical to those shown and described in FIG. 3 , except that, after step S 10 and before step S 11 , the SPAM performs a function of tearing down the PS call to Proxy 2 and establishes a PS call to the third party application server UA 2 to implement the transfer of media content. It can be seen from a comparison of FIGS. 7 and 9 that a significant number of steps are eliminated during the control phase as well as eliminating the need for utilization of the entities such as the SGSN and the IP Multimedia CN subsystems.
- PS packet switched
- IMS Internet Protocol Version 6
- IPv6 Internet Protocol Version 6
- 3GPP IP Multimedia terminals were required to exclusively use IPv6 to access the IMS and the IMS SIP server and proxy server support exclusively IPv6.
- IPv6 Internet Protocol Version 6
- all the traffic going to the IMS had to be IPv6, even if the UE is dual stack capable, i.e., is capable of supporting both IPv4 and IPv6 and this impacts both signaling and user traffic.
- IPv6 Internet Protocol Version 6
- transparent SIP has the following additional advantages when used in a 3G network:
- FIG. 10 is a simplified diagram of a UE configured to implement the technique of present invention.
- the UE 100 preferably comprises a U-100 platform, such as an Ericsson U-100 capable of supporting UMTS.
- the U-100 platform is dual-mode enabled and supports both GSM/GPSR and WCDMA and has 3G functionality.
- the Erricsson U-100 is merely exemplary of U-100 platforms and the capabilities of the present invention may be incorporated into any other platforms of like functionality and capability.
- the UE 100 preferably includes hardware (HW) for network access services, data communication services, multimedia interface services, application platform services and operation and related services respectively shown at 142 A through 146 A.
- the UE 100 also preferably includes software supporting these services being shown respectively at 142 B through 146 B.
- Middleware services 149 are preferably implemented in connection with a platform application programming interface (API) as well as the open archives, open application framework (OAF) which is integrated into the middleware services and functions to manage all interfaces of the platform with the underlying services.
- API platform application programming interface
- OAF open application framework
- the user interface (UA 1 ) 150 which is/may be JAVA-based, enables a user to operate the mobile terminal to turn on, turn off, input data, select from among stored menus, etc.
- the user interface 150 is managed by the OAF 149 .
- the user interface 150 need not be Java-based and may support any other suitable programming language.
- the SPAM 160 is preferably integrated into the UE middleware to enhance the U-100 platform.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Method and apparatus employing a transparent session initiation protocol (SIP) technique for communication especially between a user device in one domain and an application/service provided in an external domain. The transparent SIP technique is usable in wired or wireless systems such as 3G systems and wireless local area networks (WLANs).
Description
- This application is a divisional of U.S. patent application Ser. No. 10/900,941, filed Jul. 28, 2004, which claims the benefit of U.S. Provisional Application Ser. No. 60/582,035 filed Jun. 22, 2004, which are incorporated by reference as if fully set forth.
- The present invention relates to session initiation protocol (SIP) in a communication system and, in particular, to an apparatus and method for significantly reducing the number of interfaces required between caller and called agents.
- A typical SIP scenario involves one or more proxy/re-direct servers as shown in
FIG. 1 . The “trapezoidal” arrangement shown therein includes a caller (UA1) entity and a called (UA2) entity. The UA1 caller may be anyone of a variety of user equipments (UEs) such as a properly equipped laptop, PDA, wireless cell phone capable of transmitting and receiving data as well as voice, and so forth. One important SIP feature is the ability to invite new participants to a call. - A user is identified in SIP using an SIP uniform resource identifier (URI) which may, for example, be UA1 at Domain (A). The Domain (A) server,
Proxy 1, determines an SIP server for Domain (B), in this case,Proxy 2, using directory name service (DNS) procedures. During the message exchange, the caller UA1 and called UA2 entities exchange addresses at which they would like to receive communicated media from each other. - Once session establishment is completed, the caller/called entities can exchange data directly without involvement of the SIP proxies, such as
Proxy 1 andProxy 2. Conventionally, the control signals are communicated as illustrated by control signal lines CS via the proxy servers while the media content is shared as illustrated by media line MS. - Conventional techniques require that users in a particular network must always use the SIP proxy servers of that network operator in order to establish a SIP session. Third party application providers make their servers available to the network operator via open interfaces. The network operator makes these third party servers, and the applications they provide, available to the user via proxy servers within their networks. Typically, the network operator charges the user for access to the service with only a small amount of the revenue passed through to the third party application server provider.
- The servers in the operators network are used to provide access to the third party application servers. The network operator controls the use of these servers and as a result, also controls access to the third party application servers. The present invention enhances access to third party application servers from user devices attached to operator networks and also provides the ability to increase the revenue stream for those services to the third party providers.
- The objective of the present invention is to address scenarios where SIP is employed for contacting a third party application or content server transparently. The motivation behind this invention is the provision of a transparent means of network traversal to access third party application and content servers located outside of the operators' network.
- BRIEF DESCRIPTION OF THE INVENTION
- The present invention provides for the utilization of “smart” SIP Proxy Agent Middleware (SPAM) which are preferably integrated into user devices. In a preferred embodiment, all user agents (UAs) in a user device are configured with SPAM as an outbound proxy. A User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests. A user device refers to a physical communication device such as a mobile phone, PDA, laptop or other type of network connectable communication device. There can be more than one User Agent in a user device at any instant of time.
- Preferably, the address of the SIP proxy server, which is illustrated in the Figures as
Proxy 1 in Domain A, and the address of the internal domain, which is the network operator's domain i.e. Domain A, are provided to SPAM. Depending upon the domain that the UA is trying to contact, SPAM preferably determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain. - The above as well as other objects of the invention will become apparent when reading the accompanying detailed description in conjunction with the drawings in which like elements are designated by like numerals.
-
FIG. 1 is a overview diagram illustrating a conventional SIP scenario employing two proxy/re-direct servers. -
FIG. 2 is a simplified diagram utilizing the method and apparatus of the present invention for accessing a third party application server. -
FIG. 3 is a detailed flow diagram of a transparent SIP for external domains in accordance with the present invention. -
FIG. 4 is a detailed flow diagram of a SIP employed for internal domains. -
FIG. 5 is a simplified diagram of both the conventional technique and the technique of the present invention employing a transparent SIP in a wireless local area network (WLAN). -
FIGS. 6A and 6B show flow diagrams of conventional Proxy-call state control function (P-CSCF) discovery using dynamic host configuration protocol (DHCP) and directory name service (DNS) and using packet data protocol (PDP) context activation signaling respectively. (Source: 3GPP TS 24.228 V5.6.0 (2003-09). -
FIG. 7 is a flow diagram of a conventional mobile originating network with service based local policy and without resource reservation protocol (RRP) for general packet radio service (GPRS) procedures. -
FIG. 8 is a simplified diagram of the employment of transparent SIP in third generation (3G) networks. -
FIG. 9 is a flow diagram of a mobile switching center transparent SIP for external domains. -
FIG. 10 is an illustration of an example user device made in accordance with the teaching of the present invention. - In order to simplify communication between the calling and called entities, the present invention provides method and apparatus which employ an improved session initiation protocol (SIP) for transparently contacting third party applications or content servers. A transparent means of network traversal is provided to access to third party application and content servers located outside of the operator's network.
- To accomplish this, “smart” SIP proxy agent middleware (SPAM) is provided in user devices which are conveniently referred to as User Equipments (UEs). In a preferred embodiment, all user agents (UAs) in a UE are manually configured with SPAM as an outbound proxy. A User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests. A User Equipment (UE) refers to the physical user device such as a mobile phone, PDA, laptop or other type of network connectable communication device which may serve as an SIP terminal. There can be more than one User Agent in a UE at any instant of time.
- The address of the SIP proxy server, which, for the example illustrated in
FIG. 1 , is the proxy server in a domain A, and an internal domain which is the network operator's domain, are provided to SPAM. Depending on the domain that a UA is attempting to contact, SPAM determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain. - For external domains, i.e., networks outside of the operator's domain, SPAM determines the SIP server of the external domain by, for example, identifying the IP address, port and transport protocol for the external domain's proxy server, such as
Proxy 2 in Domain B illustrated inFIGS. 1 and 2 , by performing a directory name service (DNS) lookup. - For an internal domain, such as within the network operator's Domain (A), the request is sent to the SIP proxy server,
Proxy 1 in Domain A specified by the operator, wherein internal services provided are obtained in a conventional manner. - With reference to
FIG. 2 , when external services are desired, SPAM provides the SIP uniform resource identifier (URI) for UA1 in the form of a numerical internet protocol (IP) address of an SIP terminal, for instance UA1, at 162.178.9.6, in which the internal domain proxy server,Proxy 1 of Domain A, is omitted when performing SIP transactions. This architecture is utilized when the SIP terminal, i.e. UA1, initiates a call to a third party application/content server. More specifically, in the example ofFIG. 2 , UA1 utilizes the SIP URI forProxy 2 of Domain B in order to access services from content server UA2. The control communications links between UA1,Proxy 2 and UA2 are identified as CS, the media communication link which is established is illustrated as MS. Accordingly, SPAM enables the SIP terminal, UA1 to bypassProxy 1 of Domain A. - Specific example of the processes involved are illustrated in
FIGS. 3 and 4 which show a flow diagram of a user device employing transparent SIP for communication with external domains. Although UA1 and SPAM are illustrated separately inFIGS. 3 and 4 , preferably they are both implemented in the physical user device employed as the SIP terminal acting as “caller.” At step S1, UA1 sends an invitation signal, Invite, to SPAM. At S1A ofFIG. 3 , SPAM then identifies the Invite as an external domain. A preferred procedure for the case where SPAM identifies the Invite as a request for internal services is illustrated inFIG. 4 . - For the external service case of
FIG. 3 , at S1B, a DNS lookup is performed by SPAM, such as by SPAM accessing a DNS Server viaProxy 1. Upon obtaining the address of the proxy server of the external domain, in thiscase Proxy 2 of Domain B, at step S2, an Invite from SPAM is communicated toProxy 2. At step S3, SPAM preferably reports a 100 “trying” communication to UA1. -
Proxy 2, responsive to the Invite from SPAM, communicates, at step S4, an Invite signal to a called third party application server, in this case UA2. Preferably, at step S5,Proxy 2 also sends a 100 “trying” communication to SPAM which may be relayed to UA1. - UA2, responsive to the Invite (step S4), preferably sends a 180 Ringing communication to
Proxy 2 at step S6, which, at step S7, preferably sends a 180 Ringing communication to SPAM which, in turn preferably sends a 180 Ringing communication to UA1, at step S8. - Acceptance of the Invite (step S4) by UA2, preferably results in a 200 OK message, at step S9, which is communicated to
Proxy 2.Proxy 2 then, at step S10, sends a 200 OK communication to SPAM, which, in turn, sends a 200 OK communication to UA1, at step S11. Responsive to the 200 OK communication (step S11), UA1 sends an acknowledgement (ACK) directly to UA2, at step S12, whereupon a Media session is initiated at step S12A via a conventional link that bypasses the proxy servers. - Upon completion of the media session, UA2 sends a BYE communication to UA1, at step S13 whereupon UA1, at step S14, responds with a 200 OK communication to UA2. Such session termination corresponds with conventional techniques; by definition SIP are protocols which are directed to the control of session initiation.
-
FIG. 4 is a flow diagram of a preferred method of employing SIP for internal domains wherein UA1, at step S1, sends an invitation signal, Invite, to SPAM which, at step S1A, SPAM identifies the Invite as being directed to an internal domain. At step S2, SPAM sends an Invite toProxy 1, and preferably, at step S3, sends a 100 Trying communication to UA1. Proxy server,Proxy 1, may be the server which controls the provision of the requested internal service, in whichcase Proxy 1 continues by directly contacting the “called entity” within the common Domain. - In the case shown in
FIG. 4 where another proxy server,Proxy 2, controls the “called entity” UA2 which provides the desired internal services,Proxy 1, responsive to the Invite (step S2), performs a DNS lookup, at step S2A, and sends an Invite toProxy 2, at step S4, and further sends a 100 Trying communication to SPAM, at step S5.Proxy 2, responsive to the Invite (step S4), sends an Invite to UA2, at step S6 and sends a 100 trying communication toProxy 1, at step S7. InFIG. 4 , UA2 andProxy 2 are in same domain as UA1 andProxy 1. - The UA2, at step S8, sends a 180 Ringing communication to
Proxy 2 which responds by sending a 180 Ringing communication toProxy 1, at step S9,Proxy 1 responding thereto by sending a 180 Ringing communication to SPAM, at step S10. SPAM, at step S11, sends a 180 Ringing communication to UA1. - Upon acceptance of the Invite (step S6), UA2 sends a 200 OK communication to
Proxy 2, at step S12,Proxy 2 sending a 200 OK communication toProxy 1, at step S13, and SPAM receiving 200 OK fromProxy 2 at step S14, responding thereto by sending a 200 OK to UA1, at step S15. UA1 responds to the 200 OK by sending an Acknowledgement (ACK) to UA2, at step S16, and a Media session between UA1 and UA2 is set up, at step S16A. - When a session is completed, UA2, at step S17, sends a BYE to UA1 which responds with a 200 OK communication to UA2, at step S18.
- The user devices which are configured with the SPAM associated with UAs may be configured for operation within either a wired or wireless embodiment. Accordingly, the user device may take the form of a wireless transmit receive unit (WTRU) configured for use in a wireless network such as a wireless local area network (WLAN) employing one or more of the IEEE 802 family of standards or a Universal Mobile Telecommunications Systems (UMTS) employing code division multiple access (CDMA). The term WTRU includes but is not limited to a user equipment (UE), mobile station, fixed or mobile subscriber unit, pager, or any other type of device capable of operating in a wireless environment.
-
FIG. 5 is a simplified diagram comparing the conventional SIP technique with the SIP Transparent technique of the present invention in which transparent SIP is utilized in a wireless local area network (WLAN), for example. The conventional control technique is illustrated as a dotted line denoted original control and shows UA1 communicating via an access point (AP) of a WLAN at CC1. The AP in turn communicates viaProxy 1 at CC2.Proxy 1 communicates via an internet protocol (IP) backbone withProxy 2 at CC3.Proxy 2 communicates with the third party application/content server UA2 at CC4. - Utilization of the control technique of the present invention is illustrated with the lighter weight solid line identified as Modified Control that shows UA1 communicates with the UA2 through the AP, IP backbone and
Proxy 2 as indicated by the modified control links MC1, MC2 and MC3. In both cases, the content services provided from UA2 through the IP backbone and the AP to UA1 is shown by the heavy line media connection MM1, MM2. However, using the modified control path,Proxy 1 is bypassed due to the use of the transparent SIP in the WLAN for SIP call control flow. - Conventional SIP call flows emanating in a third generation partnership project (3GPP or 3G) communication system, such as specified in 3GPP Technical Specification 24.228 V5.6.0 (2003-09) are shown in
FIGS. 6A and 6B . With reference toFIG. 6A , a UE performs a general packet radio service (GPRS) Attach, performing a PDP context activation procedure, at step S1, which step is conducted with a Proxy-call state control function (P-CSCF) to a Gateway GPRS Support Node (GGSN). An address is obtained using a dynamic host configuration protocol (DHCP) procedure, utilizing DHCP and DNS queries, which take place between the UE and the GGSN, and the GGSN and a DHCP server, as shown at step S2. The DSN query/response takes place in a communication between the UE and a DNS server, at step S3, which steps are conventional. -
FIG. 6B shows the manner in which the procedure for P-CSCF discovery is employed using an activate PDP context request. More particularly, the UE at step S1, activates the PDP context request. Responsive thereto, the GGSN at step S2 creates a PDP context request which is communicated to the DHCP server. The DHCP server at step S3, obtains IP addresses of P-CSCF(s). A PDP context response is created by the DHCP server and communicated to the GGSN, at step S4 which, in turn, provides an activate PDP context accept and communicates this to the UE, at step S5. -
FIG. 7 shows an example of General Packet Radio Service (GPRS) and Common Open Policy Service (COPS) interactions during a session setup when a service based local policy (SBLP) is applied.FIG. 7 shows a conventional mobile originating network example, such as specified in 3GPP Technical Specification 24.228 V5.6.0 (2003-09). Since a serving CSCF (S-CSCF) is not involved in the GPRS interaction it has been omitted from the flow diagram, but it is assumed that a serving CSCF (S-CSCF) or interrogating CSCF (I-CSCF) is the next entity in the signaling flow and is referred to as a “next entity” in the example as explained below. The GPRS comprises part of a Universal Mobile Telecommunications System (UMTS) access system for UEs configured for use in such a 3G system. The (S-CSCF) and next entities form part of an IP Multi-Media Core Network (CN) Subsystem that interfaces with the Internet. - At step S1, a UE communicates an Invite to a P-CSCF, operating as a Policy Decision Function (PDF). The P-CSCF, at step S2, sends a 100 trying communication to the UE and, at step S3, sends an Invite to the next entity. The next entity, at step S4, sends a 100 trying communication to the P-CSCF and, at step S5, the next entity sends a 183 session progress communication to the P-CSCF. At step S6, the P-CSCF authorizes the Quality of Service (QoS) resources and, at step S7, sends a 183 session progress signal to the UE. The UE, responsive to step S7, sends, at step S8 an acknowledgement signal (PRACK) to the P-CSCF which, at step S9, relays the PRACK to the next entity.
- SIP defines two types of responses, provisional and final. Final responses convey the result of the request processing, and are sent reliably. Provisional responses provide information on the progress of the request processing, but are not sent reliably in RFC 3261. It has been observed that reliability is important in several cases, including interoperability scenarios with a Public Switch Telephone Network (PSTN). Therefore, an optional capability was needed to support reliable transmission of provisional responses. That capability is provided by PRACK (refer RFC 3262). Reliable responses are retransmitted by the Transaction User (TU) with an exponential backoff. Those retransmissions cease when a PRACK message is received. The PRACK request plays the same role as ACK, but for provisional responses.
- The next entity, at step S10, sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S11. At step S12, the UE sends a GPRS: ACTIVATE PDP context to a Serving GPRS Support Node (SGSN) which, at step S13, sends a GPRS create PDP context to a GGSN, which, at step S14 sends a COPS: request (REQ) activate PDP context to the P-CSCF, which, responsive to step S14, sends a COPS:DEC policy information communication to the GGSN, at step S15. The GGSN, at step S16, sends a COPS:RPT activate PDP context to the P-CSCF and, at step S17, the GGSN sends a GPRS: create PDP response to the SGSN, which, responsive to step S17, sends a GPRS:ACTIVATE PDP context accept to the UE, at step S18.
- The UE, at step S19, sends an update to the P-CSCF which relays this to the next entity, at step S20. The next entity, at step S21 sends a 200 OK update to the P-CSCF which relays this message to the UE, at step S22. The next entity, at step S23, also sends a 180 ringing message to the P-CSCF which relays this message to the UE, at step S24. The UE, at step S25, sends an PRACK to the P-CSCF which relays this message to the next entity, at step S26. The next entity, at step S27, sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S28.
- At step S29, the next entity sends a 200 OK (INVITE) to the P-CSCF which, at step S30, sends a COPS:DEC (open “gate”) to the GGSN. The GGSN, at step S31, sends a COPS:RPT (report outcome) to the P-CSCF, which sends a 200 OK (INVITE) to the UE, at step S32. Responsive thereto, the UE sends an ACK to the P-CSCF, at step S33, which conveys the ACK message to the next entity, at step S34.
-
FIG. 8 shows a 3G Network in which a conventional control path is shown by dotted line C1 denoted Original Control and a control path in accordance with the present invention is shown by thin solid line C2 denoted modified Control. The media path for both cases is illustrated by heavy solid line M. Using conventional control techniques, such as described in connection withFIG. 7 , UA1 interacts with the UMTS access components (which includes the Radio Network Subsystem (RNS), SGSN, GGSN), the IP Multi-Media CN Subsystem (IMS) (which includes the P-CSCF, I-CSCF, S-CSCF) in order to establish a control path via the Internet between UA1 and the proxy server,PROXY 2, and the third party application/content server in the third party domain. Employing the transparent SIP technique of the present invention, the IP Multi-Media CN Subsystem (IMS) is omitted from the control path and the UA1 communicates directly with thePROXY 2 and third-party application/content server employing only the RNS, SGSN and GGSN UMTS access components. The media path M remains the same using the conventional control technique for the transparent SIP technique. -
FIG. 9 is a flow-diagram illustrating an example of the transparent SIP technique for external domains employed in a 3G system in which preferably the user agent UA1 and SPAM are implemented in a UE configured for use in a 3G system. Alternatively, SPAM could be embodied in one of the UMTS access components. UA1, at step S1, sends an Invite to SPAM which, at step S1A, identifies the third party application/server (UA2) as being located in an external domain and, at step S1B, invokes a GPRS attach. - The SPAM, at step S1C, establishes PDP context bearer by using a PDP context establishment procedure, which is conventional, and is described at 3GPP TS 24.008. “ACT” in step S1C stands for “PDP Context Activation Procedure.” At step S1D, SPAM performs a DNS lookup, and identifies IP address, port and transport protocol for
Proxy 2 in external domain B, by communicating with a DNS server. - The SPAM, at step S1E, then establishes a packet switched (PS) call to
Proxy 2 in Domain B. Thereafter, the remaining steps S2 through S14 are conducted between UA1,Proxy 2 and UA2 are substantially identical to those shown and described inFIG. 3 , except that, after step S10 and before step S11, the SPAM performs a function of tearing down the PS call toProxy 2 and establishes a PS call to the third party application server UA2 to implement the transfer of media content. It can be seen from a comparison ofFIGS. 7 and 9 that a significant number of steps are eliminated during the control phase as well as eliminating the need for utilization of the entities such as the SGSN and the IP Multimedia CN subsystems. - Significant advantages of the transparent SIP technique for use in 3G networks resides in the fact that IMS is exclusively Internet Protocol Version 6 (IPv6) which provides support for identity and can be used to identify flows and improve QoS. 3GPP IP Multimedia terminals were required to exclusively use IPv6 to access the IMS and the IMS SIP server and proxy server support exclusively IPv6. Hence, all the traffic going to the IMS had to be IPv6, even if the UE is dual stack capable, i.e., is capable of supporting both IPv4 and IPv6 and this impacts both signaling and user traffic. Accordingly, prior to the present invention, there was no means to use SIP-based applications in 3GPP Re199 and Re14 version networks.
- Apart from the obvious advantage of providing a transparent means of network traversal to access third party application and content servers located outside of the operator's network, transparent SIP has the following additional advantages when used in a 3G network:
- The transparent SIP is independent of IP version used, (e.g. IPv4, IPv6 or later conceived versions).
- Provides a means to use SIP based applications in 3GPP Re199 and Re14 version networks.
- The SPAM may be integrated into U100 platforms such as the Ericsson Mobile Platform U100, which is dual mode-enabled and supports both GPRS for the Global System for Mobile Telecommunications (GSM/GPRS) and WCDMA.
- The SPAM may be integrated into the U100 Middleware, is not processor intensive and SIP based applications that use SPAM for Re14 and Re199 versions of the GPP can also be incorporated therein.
- The SPAM may be advantageously integrated into any other mobile units of similar capabilities such as an Ericsson U100.
-
FIG. 10 is a simplified diagram of a UE configured to implement the technique of present invention. TheUE 100 preferably comprises a U-100 platform, such as an Ericsson U-100 capable of supporting UMTS. The U-100 platform is dual-mode enabled and supports both GSM/GPSR and WCDMA and has 3G functionality. However, the Erricsson U-100 is merely exemplary of U-100 platforms and the capabilities of the present invention may be incorporated into any other platforms of like functionality and capability. - The
UE 100 preferably includes hardware (HW) for network access services, data communication services, multimedia interface services, application platform services and operation and related services respectively shown at 142A through 146A. TheUE 100 also preferably includes software supporting these services being shown respectively at 142B through 146B.Middleware services 149 are preferably implemented in connection with a platform application programming interface (API) as well as the open archives, open application framework (OAF) which is integrated into the middleware services and functions to manage all interfaces of the platform with the underlying services. For example, the user interface (UA1) 150, which is/may be JAVA-based, enables a user to operate the mobile terminal to turn on, turn off, input data, select from among stored menus, etc. may, when the platform takes the form of a cell phone, have a conventional telephone keypad together with other operating buttons to provide on/off, scan, mode selection and other typical functions. Alternatively, the manual interface may be a keyboard type input or the manual input may be a touch screen type or the like. Theuser interface 150 is managed by theOAF 149. Theuser interface 150 need not be Java-based and may support any other suitable programming language. TheSPAM 160 is preferably integrated into the UE middleware to enhance the U-100 platform. - Although the features and elements of the present invention are described in the preferred embodiments in particular combinations, each feature or element can be used alone (without the other features and elements of the preferred embodiments) or in various combinations with or without other features and elements of the present invention.
Claims (7)
1. A method employed by a user device (UE) having a proxy agent and being capable of support by a third generation (3G) system, said method enabling the UE in one domain to communication with a third party application/content server in a domain external to the user device, the method comprising:
the user device:
generating an Invite communication;
the proxy agent:
invoking a general packet radio service (GPRS) attach responsive to said Invite communication;
establishing a packet data protocol (PDP) context bearer employing a PDP context establishment procedure;
performing a directory name service (DNS) lookup and identifying the IP address, port and transport protocol for a Proxy 2 in the external domain;
establishing a packet switch (PS) call to a proxy server (Proxy 2) in said external domain; and
transmitting an Invite communication to said Proxy 2 to initiate a media session directly between said UE and said third party application/content server (AS).
2. The method of claim 1 wherein the Proxy 2:
provides an invite communication to the AS; and
said AS:
initiates a session with the UE.
3. A user device (UE) configured for operation in a first wireless domain having a capability to directly communicate with an application/content server (AS) in a second wireless domain outside of said first domain, the UE comprising:
a mobile platform configured to support 3GPP, said mobile platform being further configured to:
identify an Invite communication as intended for an external domain responsive to an Invite communication initiated by the UE;
invoke a general packet radio service (GPRS) attach;
perform a packet data protocol (PDP) context establishment procedure;
perform a directory name service (DNS) lookup and identify an IP address, port and transport protocol for a Proxy 2 in the second domain; and
establish a packet switched (PS) call to said Proxy 2 in said second domain.
4. The UE of claim 3 configured as a wireless UE wherein said mobile platform is a U-100 mobile platform.
5. The UE of claim 3 wherein the mobile platform is configured to support GPRS for the Global System for Mobile Telecommunications (GSM/GPRS) and wideband code division multiple access (WCDMA).
6. The UE of claim 3 wherein said mobile platform configured for dual-mode use.
7. A wireless transmit receive unit (WTRU) having a proxy agent for wireless communication within a wireless network system and configured to operate in selected domain and to communicate with a third party application/content server in an external domain that is external to the selected domain, the WTRU being further configured to generate an Invite communication;
said proxy agent being configured to:
invoke a general packet radio service (GPRS) attach responsive to said Invite communication;
establish a packet data protocol (PDP) context bearer employing a PDP context establishment procedure;
perform a directory name service (DNS) lookup and identifying the IP address, port and transport protocol for a proxy server (Proxy 2) in the external domain;
establish a packet switch (PS) call to the Proxy 2 in the external domain; and
transmit an Invite communication to the Proxy 2 to initiate a media session directly between the WTRU and the third party application/content server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/433,318 US20090207828A1 (en) | 2004-06-22 | 2009-04-30 | Transparent session initiated protocol |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US58203504P | 2004-06-22 | 2004-06-22 | |
US10/900,941 US7574595B2 (en) | 2004-06-22 | 2004-07-28 | Transparent session initiated protocol |
US12/433,318 US20090207828A1 (en) | 2004-06-22 | 2009-04-30 | Transparent session initiated protocol |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/900,941 Division US7574595B2 (en) | 2004-06-22 | 2004-07-28 | Transparent session initiated protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090207828A1 true US20090207828A1 (en) | 2009-08-20 |
Family
ID=35482071
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/900,941 Expired - Fee Related US7574595B2 (en) | 2004-06-22 | 2004-07-28 | Transparent session initiated protocol |
US12/433,318 Abandoned US20090207828A1 (en) | 2004-06-22 | 2009-04-30 | Transparent session initiated protocol |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/900,941 Expired - Fee Related US7574595B2 (en) | 2004-06-22 | 2004-07-28 | Transparent session initiated protocol |
Country Status (1)
Country | Link |
---|---|
US (2) | US7574595B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100274898A1 (en) * | 2009-04-28 | 2010-10-28 | The Boeing Company, A Corporation Of Delaware | System and method for effecting communications among devices in different domains employing different operating protocols |
US20230006965A1 (en) * | 2020-02-26 | 2023-01-05 | Huawei Technologies Co., Ltd. | Application discovery method and apparatus, and system |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8019986B2 (en) * | 2005-08-12 | 2011-09-13 | Comcast Cable Holdings, Llc | Method and system for booting, provisioning and activating hardware and software clients |
WO2007113636A2 (en) * | 2006-04-03 | 2007-10-11 | Nokia Corporation | Multimedia session domain selection |
US20070258455A1 (en) * | 2006-05-08 | 2007-11-08 | Futurewei Technologies, Inc. | System for distributed architecture for multicast access control |
CN101536409B (en) * | 2006-11-13 | 2011-12-14 | 艾利森电话股份有限公司 | Method and arrangement in an internet protocol multimedia subsystem |
US9871872B2 (en) * | 2007-04-13 | 2018-01-16 | Nokia Technologies Oy | Mechanism for executing server discovery |
GB0712386D0 (en) * | 2007-06-26 | 2007-08-01 | Samsung Electronics Co Ltd | Enabling ue access domain selection for terminated speech/video calls |
KR101013654B1 (en) * | 2007-08-09 | 2011-02-10 | 엘지전자 주식회사 | Method and device for selecting and managing mobility protocol in mobile communication system |
WO2009033382A1 (en) * | 2007-09-13 | 2009-03-19 | Huawei Technologies Co., Ltd. | Method and network element device for acquiring the policy control information of ip access session |
US8566453B1 (en) * | 2007-11-19 | 2013-10-22 | Juniper Networks, Inc. | COPS-PR enhancements to support fast state synchronization |
CN101946479B (en) * | 2008-02-18 | 2015-08-19 | 爱立信电话股份有限公司 | Sip server in interworking WLAN/IMS system finds |
US9386114B2 (en) * | 2011-12-28 | 2016-07-05 | Google Inc. | Systems and methods for accessing an update server |
GB2549997B (en) * | 2016-04-19 | 2019-07-03 | Cisco Tech Inc | Management of content delivery in an IP network |
CN113709190B (en) * | 2021-10-27 | 2022-03-01 | 中兴通讯股份有限公司 | Service setting method and device, storage medium and electronic equipment |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020103850A1 (en) * | 2001-01-31 | 2002-08-01 | Moyer Stanley L. | System and method for out-sourcing the functionality of session initiation protocol (SIP) user agents to proxies |
US20020131395A1 (en) * | 2001-03-19 | 2002-09-19 | Chenghui Wang | Session initiation protocol (SIP) user agent in a serving GPRS support node (SGSN) |
US20020181424A1 (en) * | 2001-05-29 | 2002-12-05 | Interdigital Technology Corporation | System and method for reducing information communicated between universal mobile telecommunication system multimedia capable units |
US20030035401A1 (en) * | 2001-08-16 | 2003-02-20 | Interdigital Technology Corporation | Utilizing session initiation protocol for identifying user equipment resource reservation setup protocol capabilities |
US20030185177A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP gateway and methods |
US20030185188A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP Gateway and methods |
US20030185190A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP gateway and methods |
US20040054805A1 (en) * | 2002-09-17 | 2004-03-18 | Nortel Networks Limited | Proximity detection for media proxies |
US20040139230A1 (en) * | 2002-12-27 | 2004-07-15 | Lg Electronics Inc. | SIP service method in a network having a NAT |
US20040152444A1 (en) * | 2001-05-28 | 2004-08-05 | Helen Lialiamou | Charging in telecommunications network |
US20040193725A1 (en) * | 2003-03-25 | 2004-09-30 | Jose Costa-Requena | Optimal location service for managing next hop addressing for messages associated with multiple address schemes |
US20040199649A1 (en) * | 2003-03-31 | 2004-10-07 | Teemu Tarnanen | System and method to provide interoperability between session initiation protocol and other messaging services |
US20040248615A1 (en) * | 2003-06-06 | 2004-12-09 | Interdigital Technology Corporation | Wireless communication components and methods for multiple system communications |
US20050002407A1 (en) * | 2003-05-01 | 2005-01-06 | Interdigital Technology Corporation | Method and apparatus for delivery of data-based/voice services over piconets and wireless LANs (WLANs) coupled to 3GPP devices including protocol architecture and information elements relating to short message services (SMS) over WLANs |
US20050050211A1 (en) * | 2003-08-29 | 2005-03-03 | Kaul Bharat B. | Method and apparatus to manage network addresses |
US20050114513A1 (en) * | 2003-11-20 | 2005-05-26 | Motorola, Inc. | System and method for transmitting compressed messages |
US20050198363A1 (en) * | 2004-02-05 | 2005-09-08 | Yibei Ling | Preserving HTTP sessions in heterogeneous wireless environments |
US7110393B1 (en) * | 2001-02-28 | 2006-09-19 | 3Com Corporation | System and method for providing user mobility handling in a network telephony system |
US7149299B2 (en) * | 2001-12-28 | 2006-12-12 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for call completion on busy subscribers |
US7170863B1 (en) * | 2001-02-12 | 2007-01-30 | Nortel Networks Limited | Push-to-talk wireless telecommunications system utilizing a voice-over-IP network |
US7443879B2 (en) * | 2002-11-14 | 2008-10-28 | Lucent Technologies Inc. | Communication between user agents through employment of codec format unsupported by one of the user agents |
US7467208B1 (en) * | 2000-03-16 | 2008-12-16 | Nokia Corporation | Method and system for activating a packet data subscriber context for packet data |
US7536447B1 (en) * | 2001-07-16 | 2009-05-19 | At&T Corp. | Method for using scheduled hyperlinks to record multimedia content |
US7724711B2 (en) * | 2002-08-05 | 2010-05-25 | Nokia Corporation | Method of speeding up the registration procedure in a cellular network |
-
2004
- 2004-07-28 US US10/900,941 patent/US7574595B2/en not_active Expired - Fee Related
-
2009
- 2009-04-30 US US12/433,318 patent/US20090207828A1/en not_active Abandoned
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7467208B1 (en) * | 2000-03-16 | 2008-12-16 | Nokia Corporation | Method and system for activating a packet data subscriber context for packet data |
US20020103850A1 (en) * | 2001-01-31 | 2002-08-01 | Moyer Stanley L. | System and method for out-sourcing the functionality of session initiation protocol (SIP) user agents to proxies |
US7170863B1 (en) * | 2001-02-12 | 2007-01-30 | Nortel Networks Limited | Push-to-talk wireless telecommunications system utilizing a voice-over-IP network |
US7110393B1 (en) * | 2001-02-28 | 2006-09-19 | 3Com Corporation | System and method for providing user mobility handling in a network telephony system |
US20020131395A1 (en) * | 2001-03-19 | 2002-09-19 | Chenghui Wang | Session initiation protocol (SIP) user agent in a serving GPRS support node (SGSN) |
US20040152444A1 (en) * | 2001-05-28 | 2004-08-05 | Helen Lialiamou | Charging in telecommunications network |
US20020181424A1 (en) * | 2001-05-29 | 2002-12-05 | Interdigital Technology Corporation | System and method for reducing information communicated between universal mobile telecommunication system multimedia capable units |
US7536447B1 (en) * | 2001-07-16 | 2009-05-19 | At&T Corp. | Method for using scheduled hyperlinks to record multimedia content |
US20030035401A1 (en) * | 2001-08-16 | 2003-02-20 | Interdigital Technology Corporation | Utilizing session initiation protocol for identifying user equipment resource reservation setup protocol capabilities |
US7149299B2 (en) * | 2001-12-28 | 2006-12-12 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for call completion on busy subscribers |
US20030185190A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP gateway and methods |
US20030185177A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP gateway and methods |
US20030185188A1 (en) * | 2002-03-26 | 2003-10-02 | Interdigital Technology Corporation | TDD-RLAN wireless telecommunication system with RAN IP Gateway and methods |
US7724711B2 (en) * | 2002-08-05 | 2010-05-25 | Nokia Corporation | Method of speeding up the registration procedure in a cellular network |
US20040054805A1 (en) * | 2002-09-17 | 2004-03-18 | Nortel Networks Limited | Proximity detection for media proxies |
US7443879B2 (en) * | 2002-11-14 | 2008-10-28 | Lucent Technologies Inc. | Communication between user agents through employment of codec format unsupported by one of the user agents |
US20040139230A1 (en) * | 2002-12-27 | 2004-07-15 | Lg Electronics Inc. | SIP service method in a network having a NAT |
US20040193725A1 (en) * | 2003-03-25 | 2004-09-30 | Jose Costa-Requena | Optimal location service for managing next hop addressing for messages associated with multiple address schemes |
US20040199649A1 (en) * | 2003-03-31 | 2004-10-07 | Teemu Tarnanen | System and method to provide interoperability between session initiation protocol and other messaging services |
US20050002407A1 (en) * | 2003-05-01 | 2005-01-06 | Interdigital Technology Corporation | Method and apparatus for delivery of data-based/voice services over piconets and wireless LANs (WLANs) coupled to 3GPP devices including protocol architecture and information elements relating to short message services (SMS) over WLANs |
US20040248615A1 (en) * | 2003-06-06 | 2004-12-09 | Interdigital Technology Corporation | Wireless communication components and methods for multiple system communications |
US20050050211A1 (en) * | 2003-08-29 | 2005-03-03 | Kaul Bharat B. | Method and apparatus to manage network addresses |
US20050114513A1 (en) * | 2003-11-20 | 2005-05-26 | Motorola, Inc. | System and method for transmitting compressed messages |
US20050198363A1 (en) * | 2004-02-05 | 2005-09-08 | Yibei Ling | Preserving HTTP sessions in heterogeneous wireless environments |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100274898A1 (en) * | 2009-04-28 | 2010-10-28 | The Boeing Company, A Corporation Of Delaware | System and method for effecting communications among devices in different domains employing different operating protocols |
US8972596B2 (en) * | 2009-04-28 | 2015-03-03 | The Boeing Company | System and method for effecting communications among devices in different domains employing different operating protocols |
US20230006965A1 (en) * | 2020-02-26 | 2023-01-05 | Huawei Technologies Co., Ltd. | Application discovery method and apparatus, and system |
US12149499B2 (en) * | 2020-02-26 | 2024-11-19 | Huawei Technologies Co., Ltd. | Method and apparatus, and system for obtaining internet protocol (IP) address corresponding to a domain name |
Also Published As
Publication number | Publication date |
---|---|
US20050283832A1 (en) | 2005-12-22 |
US7574595B2 (en) | 2009-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090207828A1 (en) | Transparent session initiated protocol | |
US8213418B2 (en) | Providing packet-based multimedia services via a circuit breaker | |
JP5388381B2 (en) | System and method for initiating a SIP call from a user equipment device over a circuit switched network | |
US8437368B2 (en) | System and method for handing over a call from a packet-switched network to a circuit-switched network | |
US7792116B2 (en) | Method and device for interworking between internet protocol networks | |
US7746849B2 (en) | Providing packet-based multimedia services via a circuit bearer | |
EP1593250B1 (en) | Conversational bearer negotiation | |
KR100940548B1 (en) | System and method for managing call continuity in an IMS network environment using SIP messaging | |
US20060239267A1 (en) | User equipment in an IMS service network with a shortened PTT call setup time, IMS service network, and PTT call setup method therein | |
CA2547666A1 (en) | Session initiation protocol (sip) based user initiated handoff | |
US7024197B2 (en) | Wireless mid-call transfers | |
US9692835B2 (en) | Method and apparatuses for the provision of network services offered through a set of servers in an IMS network | |
US8325712B2 (en) | System and method for managing a circuit switched call using alternative signaling at the establishment of a successful session set-up | |
WO2008110110A1 (en) | Ip multimedia subsystem service providing method and system | |
US20100054177A1 (en) | Method and system of using ip multimedia system for call setup in mobile satellite systems | |
AU2008202113B2 (en) | System and method for handing over a call from a packet-switched network to a circuit-switched network | |
EP2084885A2 (en) | Address translation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |