A Study of An Open Source IP Multimedia Subsystem Test Bed

download A Study of An Open Source IP Multimedia Subsystem Test Bed

of 7

Transcript of A Study of An Open Source IP Multimedia Subsystem Test Bed

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    1/7

    A Study of An Open SourceIP Multimedia Subsystem Test Bed

    Jin TangDepartment of Electrical and

    Computer EngineeringIllinois Institute of Technology

    Chicago, Illinois [email protected]

    Carol DavidsCenter for Professional

    DevelopmentIllinois Institute of Technology

    Chicago, Illinois [email protected]

    Yu ChengDepartment of Electrical and

    Computer EngineeringIllinois Institute of Technology

    Chicago, Illinois [email protected]

    ABSTRACT

    In this paper, we present the creation and characterizationof an open source Internet Protocol Multimedia Subsystem(IMS) test bed. We built this test bed with the intentionand motivation of doing research related to the performanceof its various functional components as they cooperate toprovide IMS features. The IMS specifications describe a set

    of functional components, the interfaces between those com-ponents, and the protocols and procedures to be used acrossthose interfaces. The test bed is built based on the OpenIMS Core, which is an open source set of IMS functionalcomponents. We verify that the operation of the test bed isin conformance with the message sequence charts providedby the IMS standards. Moreover, we define four metrics thatquantify the overhead associated with IMS implementations,and present the observed values of these metrics collected onthe test bed under the conditions of no background traffic.This provides necessary and valuable data for us in order tostudy the performance when the test bed is under variousbackground traffic loads.

    Categories and Subject DescriptorsC.2.2 [Computer-Communication Networks]: NetworkProtocols

    General Terms

    Conformance Performance

    Keywords

    IMS, Open IMS Core, test bed

    1. INTRODUCTIONThe Internet Protocol Multimedia Subsystem (IMS) de-

    fines an architecture intended to standardize the delivery of

    Permission to make digital or hard copies of all or part of this work forpersonal or classroom use is granted without fee provided that copies arenot made or distributed for profit or commercial advantage and that copiesbear this notice and the full citation on the first page. To copy otherwise, torepublish, to post on servers or to redistribute to lists, requires prior specificpermission and/or a fee.Qshine08July 28-31, 2008, Hong Kong, ChinaCopyright ACM ...$5.00.

    next generation networks and the many applications, fea-tures, functions and services they promise [1]. Includedamong these are fixed-mobile convergence, converged servicedevelopment and service control, authentication, account-ing, location and access. The IMS architecture describes aset of functional components, the interfaces between thesecomponents, and the protocols and procedures to be usedacross those interfaces. The definitions are intended to sup-

    port interoperability of networks and products. The reasonsfor the development and adoption of this architecture aremany, and are the subject of much speculation, discussionand debate. Some believe that the future of telecommuni-cations requires such a unified approach [4]. Others believethat the various functions and features that IMS is designedto deliver can be achieved with satisfactory results outsidethis architecture [5]. The current study of the performanceof a system based on the IMS architecture is intended toadd data to this discussion. Today many telephone serviceproviders consider IMS functionality and conformance to beimportant to the future development of their businesses andnetworks and vendors are currently offering for sale, devicesthat incorporate one or more of the functions defined in the

    IMS architecture. There are also several IMS implementa-tions available for deployment on enterprise networks. Thecurrent study of the performance of a system based on theIMS architecture and using a vendor-neutral platform is in-tended to support these deployments by providing compar-ative data without advocating a particular vendor.

    To create our IMS Test Bed we considered three options.First, we could build a network using the functional com-ponents available on the market from various vendors. Werejected this solution since it introduces the risk that wewould be testing the interoperability of the components asmuch as the performance of the test bed. The second optionwas to develop our own code, basing our development workon the 3GPP standards. This course was not taken since itwould consume too many research hours. Instead, we chose

    to use the Open IMS Core software, available freely at [6]because it is not identified with a particular vendor and be-cause it supplies code for four inter-operable core functionalcomponents in the IMS architecture.

    The following documents are especially relevant to thiswork. [7] provides an overview of the Open IMS Core andthe related Open IMS Playground as part of the German3G beyond national test bed. [8] further describes the OpenIMS Playground and the activities in progress for establish-ing works on open issues within IMS research and develop-

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    2/7

    ment. [9] discusses the benefits and challenges in integratingthe IMS test beds in a community. Performance measure-ments describing IMS network signaling latency associatedwith various access networks are presented in [10]. IMS usesSession Initiation Protocol [11] as its signaling control pro-tocol. SIP end-to-end network performance benchmarks aredescribed in [13]. SIP device performance benchmarks aredescribed in [14]. Benchmarks for measuring the character-istic behavior and performance of IMS networks and IMS

    devices are provided in [15]. These TISPAN metrics havebeen incorporated into running code available at the SIPp[16] website. We plan to evaluate and possibly use them infuture work. More study on signaling delay can be found in[17, 18].

    Since our focus is on the behavior and performance ofthe nodes and links in an IMS environment, we installedthe four core IMS components on four separate hardwareplatforms then verified that the core functional componentsbehaved in conformance with the call flows that the 3GPPstandards specify for registration and session establishment[2, 3]. Verification was done using Wireshark traces of themessages exchanged during registration and session estab-lishment, matching them to the message sequences specified

    in the 3GPP requirements. Next we characterized the be-havior of the test bed under conditions of no-stress. We de-fined a set of four metrics and recorded their values for tenexperiments that we performed manually. The metrics areregistration time, initial response time, initial ringing timeand disconnect request time. They were chosen to reflect theexperience of the end-user and the distinction between themand the metrics identified in [13, 15] is also made. The no-stress condition provides necessary and valuable data for usto study the performance when the test bed is under variousbackground traffic loads.

    The remainder of this paper is organized as follows. Sec-tion 2 introduces the IMS core components and procedures.Section 3 describes the test bed development and operation.Section 4 shows how the characteristics of the test bed con-

    form to the 3GPP IMS standards. Section 5 identifies fourmetrics and shows the associated results for sake of the per-formance of the test bed. Section 6 concludes the paper.

    2. IMS CORE COMPONENTS AND PRO-

    CEDURESThe core functional components of the IMS are the Call

    Session Control Functions (CSCF) and the Home SubscriberServer (HSS) [1]. There are three different kinds of CSCFs:Proxy-CSCF (P-CSCF), Interrogating-CSCF (I-CSCF) andServing-CSCF (S-CSCF). They are responsible for routingsignal and managing sessions. The HSS is a database con-taining all user identities, location information and service-

    related data. It is responsible for Authentication, Authoriza-tion and Accounting (AAA). The HSS shares a long-termsecret with each of the user elements for mutual authentica-tion and for establishing Security Associations (SA) duringregistration. These four core functional components are theheart of the IMS network control plane and the test bed isdeveloped to implement all of them. Besides these core func-tional components, there are a number of additional func-tional components that may be included in an IMS network.Examples include: (1) the Policy Decision Function (PDF),that is responsible for media resource reservation and (2) the

    Application Server (AS), that is in charge of different multi-media applications and services [12]. The IMS environmentcreated by the interworking of these functional componentsenables two basic types of procedures: registration and ses-sion control. In the IMS environment, User Elements (UE)need to register on the network and then set up sessions tocommunicate with each other. We give a more detailed de-scription of the four core functional components and the twobasic procedures in the following.

    2.1 Core ComponentsProxy-Call Session Control Function (P-CSCF)is the first

    functional component the UE contacts on the IMS network.It maintains IPsec SAs with the UEs and applies integrityand confidentiality protection for SIP signaling. It is alsoable to inspect the contents of the Session Description Pro-tocol (SDP) [20] in the body of the SIP signaling messages,to identify improper media types or codecs. The P-CSCFcan also interact with the PDF to derive authorized IP QoSinformation that is used to reserve bandwidth resources forthe upcoming media streams.

    Interrogating-Call Session Control Function (I-CSCF)queriesthe HSS for the name of the S-CSCF assigned to serve a

    user who is registering. If there is no previously assigned S-CSCF, the I-CSCF receives S-CSCF capabilities. Based onthis information, the I-CSCF assigns a suitable S-CSCF forthe user and routes incoming register requests further to theassigned S-CSCF. The I-CSCF can also act like a TopologyHiding Inter-network Gateway (THIG) that hides the topol-ogy of the internal network from the external networks.

    Serving-Call Session Control Function (S-CSCF) acts asa SIP registrar. It handles registration processes, downloadsauthentication data from the HSS, generates challenges tothe UE, verifies the response from the UE and then acceptsthe registration. It also makes routing decision during ses-sion setup.

    Home Subscriber Server (HSS) is the main data storageentity. It stores private user identities, public user identities,

    user authentication vectors, roaming authorization and allo-cated S-CSCF names. It also shares a long-term secret withevery UE for the establishment of IPsec SAs and for mu-tual authentication between the UE and the network duringregistration.

    Three different kinds of Interfaces are defined betweeneach two of the core components for their communication.TheGminterface connects the UE to the IMS, by means ofthe P-CSCF. It carries SIP signaling messages between theUE and the P-CSCF. The Mw interface connects differentCSCFs. The protocol used for communication between theCSCFs is also SIP. TheCxinterface is the interface betweenthe CSCFs and the HSS. The main difference between Cxand the other two interfaces is that the messages carried

    across this interface use Diameter [21] protocol rather thanSIP.The relationship between these core functional compo-

    nents and the UE as well as the interfaces is shown in Figure1.

    2.2 ProceduresRegistration and Session are generally the two categories

    of IMS procedures.

    2.2.1 Registration

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    3/7

    Cx

    Cx

    Mw

    Mw

    Gm

    Mw

    HSS

    I-CSCF

    P-CSCF

    S-CSCF

    Figure 1: IMS Core Functional Components

    The userregistrationprocedure provides mutual authenti-cation between the UE and the IMS network using the 3GPPAuthentication and Key Agreement (3GPP-AKA) mecha-nism. The AKA is accomplished by the S-CSCF challeng-

    ing the UE with a 401 Unauthorized message after receivingthe initial REGISTER message from the UE and the UE re-sponding with a second REGISTER message. In addition,the IMS access security begins with the establishment ofIPsec SAs between the UE and the P-CSCF. These provideboth integrity and confidentiality protection services for thetraffic going through between the two parties. The IPsecSAs are established during the initial authentication, andtake effect after the authentication procedure is finished.Protected server ports and protected client ports for boththe UE and the P-CSCF are set for all the SAs [22].

    2.2.2 Session

    Two UEs can set up sessions such as voice calls or videosharing between each other after both of them successfullyregister on the IMS network. The session setup is achievedby SDP offer/answer exchanges carried in SIP messages.The IMS capability to create innovative multimedia applica-tions and services derives from this ability to establish andmanage different multimedia sessions.

    3. THE TEST BED DEVELOPMENT AND

    OPERATIONWe aimed to build a test bed that conforms to the 3GPP

    IMS standards using an open source solution. IMS is basedprimarily on extensions to SIP for registration and sessioncontrol to make it easily integrated to the existing networks.Thus it would be natural to try to build an IMS system by

    extending existing SIP proxies. There are open source SIPproxies that have been around for some years, and the SIPExpress Router (SER) is one of the most commonly usedamong them. The call session control functions of the OpenIMS Core are extended from the SER to deal with extensionsof SIP for IMS. This is done by adding dynamically load-able modules to the SER. Additionally, since IMS requiresus to query the HSS for information related to user registra-tion and the routing of signaling messages, an HSS is neces-sary and developed as part of the Open IMS Core based onMySQL and the JavaDiameterStack to communicate with

    Alice Bob

    P-CSCF

    I-CSCF S-CSCF

    HSS

    Figure 2: Test Bed Architecture

    the CSCFs through the Diameter protocol. These CSCFsand HSS together provide the basis for an open source solu-tion of IMS.

    In the test bed, our core network consists of four OpenIMS Cores installed on four separate Linux systems that areall connected to a hub. Its compilation and installation re-quire as a prerequisite the additional installation of support-

    ing software including GCC, JDK, ant and other packagesas indicated in [19]. The Core itself consists of all four IMScore functional components. They are controlled by theirown startup scripts and can be turned on either all togetheror separately. A web console comes with the HSS to add,delete and manage user profiles. Although all the functionalcomponents can run on one Linux system, we chose to sep-arate them to create an environment that more closely re-sembles a real-world installation. We started one function oneach of the four systems in order to make them collaborateto function as an IMS core network. The four-in-one setupwas still helpful to get us familiar with the characteristics ofthe Open IMS Core.

    We chose OpenIC Lite as the user element since it wasalso from Fraunhofer FOKUS [23]. It is open source andprovides the basic functional behaviors as an IMS user ele-ment such as SIP-based signaling and AKA authentication.The OpenIC Lite also provides an ISIM profile simulationfeature. An ISIM is an application in which a user elementshares a long-term secret with the HSS for purposes like au-thentication and session key establishment. The applicationusually resides on a tamper resistent hardware, such as aUSIM card, but the simulation feature gives us a convenientsoftware solution. We configured two OpenIC Lite user ele-ments, Alice and Bob, and added them to the HSS throughthe web console. In this case we manually set a shared se-cret between each of the users and the HSS. The two UEswere configured to communicate with the P-CSCF, the firstcontact point of the IMS core network. The four core func-

    tional components and two user elements together are theIMS functional part of the test bed and are illustrated inFigure 2.

    To make the host names of the core functional compo-nents such as pcscf.open-ims.testrecognizable to others inthe network, we set up a minimal DNS server using BIND9.Note that the DNS server here only provided basic hostname-IP address mapping function and was not yet used forP-CSCF address discovery [12]. We also set up a MySQLserver, since the HSS needed a database to store data suchas private user identities, public user identities and user au-

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    4/7

    thentication vectors. Additionally, we connected anotherLinux system running the Wireshark network protocol ana-lyzer in order to sniff traffic in the network and analyze thecharacteristics and performance of the test bed. All BIND9,MySQL and Wireshark are open source software and providenecessary services to the IMS core network.

    The test bed was up and running after we started the corefunctional components as well as the DNS and MySQL ser-vices. We let the two OpenIC Lite user elements, Alice and

    Bob, register on the network. Next, We initiated a sessionfrom Alice to Bob using Bobs public identity sip:[email protected]. Bob answered the call and a voice call session wasestablished. We traced both the registration and sessionsetup procedures using Wireshark.

    To further develop the test bed and continue our research,we plan to add more domains to our environment in orderto test handoff and voice continuity. To achieve this, wewill add security gateways between the domains. To testthe resilience of the Open IMS Core, we plan to add a traf-fic generator in the environment. After the IMS test bed ischaracterized, we plan to introduce commercial components,one at a time, to replace the IMS Core functional compo-nents and to repeat our characterization tests and observe

    variations in performance.

    4. THE TEST BED CONFORMANCEIn order to verify that the test bed is IMS conformant we

    compared the traces collected during the UE registrationand session establishment with the message flows specifiedin the IMS standards. The detailed results of the comparisonare described below.

    4.1 RegistrationIn IMS, the user registration procedure performs mutual

    authentication between the UE and the IMS network us-ing the 3GPP Authentication and Key Agreement (3GPP-AKA) mechanism, based on a long-term secret shared bythe UE and the HSS.

    During authentication, a user, Alice, sends her identity inthe initial REGISTER request to the IMS network. Thisrequest is finally routed to the S-CSCF. Upon receipt ofthe REGISTER request, the S-CSCF downloads Alices Au-thentication Vector (AV) from the HSS. The AV includesfive parameters generated from the shared secret, namelyRAND, XRES, AUTN, IK and CK. The S-CSCF removesthe XRES and sends a 401 Unauthorized response, includ-ing the other four parameters, towards the UE through I-CSCF and P-CSCF. Upon receipt of the 401 response, theP-CSCF removes the IK and the CK and sends AUTN andRAND to the UE. The AUTN is verified by the UE based onthe shared secret. If this verification is successful, the IMSnetwork is authenticated to the UE. The RAND is used to

    calculate RES. The IK and the CK are calculated by theUE based on the shared secret. Thus, two session keys areknown and shared by the UE and the P-CSCF at this point.These two session keys are used for the two parties to set upa set of IPsec SAs. Subsequent traffic will go through thenewly established protected server and client ports ratherthan through the original, unprotected ports. The UE thensends a second REGISTER request including the RES men-tioned above to the S-CSCF. The S-CSCF compares the re-ceived RES to the XRES. If the two values are equal, the UEis authenticated to the IMS network, and this is indicated to

    Request: REGISTER

    Status: 401 Unauthorized

    Request: REGISTER

    Status: 200 OK

    Request: REGISTERAlice

    AliceRequest: REGISTER

    Alice

    Status: 401 Unauthorized

    Status: 401 Unauthorized

    RAND, AUTH, CK, IK

    RAND, AUTH, CK, IK

    RAND, AUTH

    RES

    UEAuthenticates

    Network

    Request: REGISTERRequest: REGISTER

    RESRES

    Status: 200 OK

    Status: 200 OK

    NetworkAuthenticates

    UE

    UE P-CSCF I-CSCF S-CSCF

    Figure 3: Standard Registration Procedure

    the UE by a 200 OK response. After mutual authentication

    is accomplished, the network registers the UE as a legitimateuser. The procedure is illustrated in Figure 3. HSS is notincluded for simplicity.

    We captured traces on the test bed during the registra-tion process and generated message flow charts using thegraph tool in Wireshark. The resulting graph is shown inFigure 4. There we observe that the S-CSCF of the OpenIMS Core sent a 401 Unauthorized message to the user Al-ice after the initial REGISTER message and Alice respondedwith a second REGISTER message followed by a 200 OK.This challenge-response procedure is identical to the stan-dard 3GPP-AKA mechanism and we conclude that mutualauthentication occurred according to the IMS standards. Ifwe look further into the header fields of the SIP messages inthe trace, the WWW-Authentication header is inside the 401Unauthorized messages to challenge Alice, while the Autho-rization header is in the first REGISTER message to initiatethe authentication and in the second REGISTER messageto respond to the challenge. The presence and populationof these header fields is also in conformance with the IMSspecifications.

    Continuing to examine Figure 4, we see that no IPsec secu-rity association was set up between Alice and the P-CSCF,since the second REGISTER message was b oth sent andreceived through the same UDP ports as the initial REGIS-TER message, rather than through a new protected clientport at the UE side and a protected server port at the P-CSCF side. IPsec is mandatory for IMS access security inthe standards and is used to protect all traffic between the

    UE and the P-CSCF afterwards. We looked into the headerfields of the SIP messages and found out Alice did not in-clude the Security-Client header in the initial REGISTERmessage which was supposed to initiate the IPsec SA nego-tiation. Thus the failure of IPsec was due to the limitationof the OpenIC Lite user element at this point.

    The last thing we got from the message flows was that theP-CSCF associated with Alice sent a SUBSCRIBE messagethrough the I-CSCF to the S-CSCF right after the registra-tion and authentication of Alice was successful. This mes-sage was used for the P-CSCF to subscribe to the registration-

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    5/7

    Alice: 192.168.1.112 P-CSCF: 192.168.1.104

    I-CSCF: 192.168.1.103 S-CSCF: 192.168.1.102

    Figure 4: Test Bed Registration Procedure

    state event package of Alice. The subscription was acknowl-edged by a 200 OK message. Afterwards, the S-CSCF senta NOTIFY message back to the P-CSCF. The body of thisNOTIFY message was of XML format, and included Alicesactual registration-state information. This procedure too isin conformance with the IMS standards.

    4.2 Session Setting UpIn IMS, thesessionestablishment procedure sets up a ses-

    sion, for example, a voice call or video sharing, between twocommunicating parties using handshake messages. Accord-ing to the 3GPP IMS standards, media negotiation shouldbe done through two offer/answer SDP exchanges to ensurea single codec per media stream in a session. The mes-sages exchanged are (1) INVITE, 183 Session Progress, and(2)PRACK, 200 OK. Resource reservation can also be pro-vided through preconditions by means of a third offer/answerSDP exchange of UPDATE, 200 OK. The information sup-plied in this exchange ensures that there are enough re-sources available to establish the session. The called partyis not supposed to ring until both of the two parties con-firm successful resources reservation. This procedure is il-lustrated in Figure 5. The IMS network core componentsare not shown in the figure since they mainly act as routers

    in the procedure.We captured traces on the test bed during the session es-

    tablishment process and generated message flow charts us-ing the graph tool in Wireshark. The resulting graph isshown in Figure 6. In this test, Alice originates a call toBob following the standard IETF SIP procedure [11]. TheCSCFs in the core network routed and processed all the ex-isting session establishing signaling messages in conformancewith the IMS specifications [1, 2, 3]. The option to reservebandwidth for the session was not used because it was notavailable in the OpenIC Lite UE. As a result, the calling

    INVITE: First SDP Offer, Codecs Desired

    PRACK: Second SDP Offer, Codec Selected

    UPDATE: Third SDP Offer, Resource Reserved

    183 Session Progress: First SDP Answer, Codecs Supported

    200 OK: Second SDP Answer

    200 OK: Third SDP Answer, Resource Reserved

    180 Ringing

    Alice Bob

    AliceReservingResource

    BobReservingResource

    Figure 5: Standard Session Set Up Procedure

    Alice: 192.168.1.112 Bob: 192.168.1.111

    P-CSCF: 192.168.1.104 I-CSCF: 192.168.1.103

    S-CSCF: 192.168.1.103

    Figure 6: Test Bed Session Set Up Procedure

    party, Alice, did not include any preconditions line in thefirst SDP offer and Bob, the called party, did not performany resource reservation upon receipt of the initial INVITE.Thus, we cannot report whether this optional function ofan IMS network is performed by our test bed in accordancewith the specifications. In future work on this test bed wewill need to incorporate a UE with the capability to performresource reservations. While the lack of such capability isnot a problem on wired networks as in the current test bed,it would be unacceptable in wireless and other environmentswhere bandwidth is a scarce commodity. We plan to mea-sure performance of IMS systems that enable fixed mobile

    convergence and we will identify and incorporate a UE thatincludes the option to use resource reservation.

    5. PERFORMANCEIn order to benchmark how the test bed performs, we

    identified four metrics, applied them and recorded the as-sociated results. We performed the registration and sessionestablishment ten times with no background traffic and cap-tured the associated traces using Wireshark. All the resultswe present are calculated by taking the differences between

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    6/7

    0

    50

    100

    150

    200

    250

    0 1 2 3 4 5 6 7 8 9 10 11

    Time(ms)

    Figure 7: Registration Time

    time stamps found in the traces. The data point n on eachof the four metric-value graphs corresponds to a value mea-sured on the nth Wireshark trace. The number of trials is

    small, yet there is already a pattern in the data. For eachmetric we saw what appears to be a single anomaly andfor all but one metric, the data cluster around two distinctvalues. Bulk, automated call generation in the next phaseof this study should help clarify if this bimodal behavior ischaracteristic. Further study of the traces for other networkactivity is needed to help explain the anomalies.

    5.1 Registration TimeThe registration time is defined as the time elapsed be-

    tween the sending of the initial REGISTER request and theappearance of the 200 OK associated with this REGISTERfrom the P-SCSF. This metric represents a lower limit on theminimum time it takes for a user to gain access to the IMSnetwork. It is comparable with the Processing time for the

    first register request defined in [15] and with thesuccessfulRegistration Request Delay defined in [13]. The results areshown in Figure 7. The average time elapsed for registra-tion was 97.4206 milliseconds. The data cluster around twodistinct values, 50 ms and 150 ms, with an anomaly of over200 ms in experiment 6.

    5.2 Initial Response TimeThe initial response time is defined as the time elapsed be-

    tween the sending of the initial INVITE and the appearanceof the first response to the INVITE, usually a 100 Tryingfrom the P-CSCF. This metric indicates the amount of timeit takes the access links and nodes to respond to a sessioninitiation request. The results are shown in Figure 8. The

    average initial response time was 0.5124 milliseconds. Thedata cluster around two distinct values, .4 ms and .6 ms withan anomaly in experiment 9 of 1.2 ms. There is no obviouscorrelation between the low values in initial response timeand the low values in registration times. For example, thereis a high initial response time recorded for experiment 7 anda low registration time in the same experiment. Meanwhile,there is a low initial response time recorded for experiment8 and a high registration time for this experiment.

    5.3 Initial Ringing Time

    0

    0.2

    0.4

    0.6

    0.8

    1

    1.2

    1.4

    0 1 2 3 4 5 6 7 8 9 10 11

    Time(ms)

    Figure 8: Initial Response Time

    0

    50

    100

    150

    200

    250

    0 1 2 3 4 5 6 7 8 9 10 11

    Time(ms)

    Figure 9: Initial Ringing Time

    The initial ringing time is defined as the time elapsed be-tween the sending of the initial INVITE and the appearanceof the first 180 ringing associated with that INVITE. Thismetric represents a lower limit on the time to ring, the

    time elapsed between the sending of the initial sessions setup request and the receipt of the ring-back signal. It iscomparable to the successful session setup delay definedin [13], but not with the metrics in [15] which include finalresponses. The results are shown in Figure 9. The averageinitial ringing time was 34.1147 milliseconds. In this case,the data settled at about 12 ms after an initial spike to 200ms in experiment 1.

    5.4 Disconnect Request TimeThe disconnect request time is defined as the time elapsed

    between the appearance of the first BYE request and theappearance of the 200 OK associated with that BYE. Thismetric indicates how long it takes to end a session after one

    of the parties sends a disconnect request. It reflects theuse of end-user bandwidth and processor resources and soprovides information about the end-user experience. It iscomparable to the time to release the resource in [15] andto the successful session disconnect delay defined in [13].The results are shown in Figure 10. The average time todisconnect a call was 48.9686 milliseconds. The data clusteraround 10 ms and 50 ms, with an anomaly of about 210 msin experiment 8.

    6. CONCLUSIONS

  • 8/10/2019 A Study of An Open Source IP Multimedia Subsystem Test Bed

    7/7

    0

    50

    100

    150

    200

    250

    0 1 2 3 4 5 6 7 8 9 10 11

    Time(ms)

    Figure 10: Disconnect Request Time

    In this paper we first describe the IMS functional com-ponents and procedures specified by the 3GPP standards.Next we show the creation and characterization of an IMScompliant test bed using the Open IMS Core. The fourcore functional components available from Open IMS Coreproved to work in conformance to the IMS standards un-der the test conditions described. We also identified a setof metrics, applied them and recorded the associated resultsto describe the behavior of the test bed under the no-loadcondition. The metrics were designed to indicate the end-user experience and we compare them to other performancemetrics in use and under development. We conclude thatthe metrics described here will add new information to thestudy of the end-user experience in IMS networks, and thatautomating their collection will yield useful results. Besidesautomating their collection, next steps will include the ad-dition of various background loads and the use of differentcommunication options and a comparison of the new resultsto those obtained under no-load and minimal options. In

    this manner we plan to contribute to the literature that ex-plains the trade-offs between security and resource reser-vation features on the one hand and device, network andapplication performance on the other, particularly as theyare experienced by the end-user.

    7. REFERENCES

    [1] 3GPP. IP Multimedia Subsystem version 7. 3G TS23.228, December 2005.

    [2] 3GPP. Signaling flows for the IP multimedia callcontrol based on Session Initiation Protocol (SIP) andSession Description Protocol (SDP); Stage 3. 3G TS24.228, 2006.

    [3] 3GPP. Internet Protocol (IP) multimedia call controlprotocol based on Session Initiation Protocol (SIP) andSession Description Protocol (SDP); Stage 3. 3G TS24.229, 2006.

    [4] G. Camarillo and M. Garca-Martn. The 3G IPMultimedia Subsystem (IMS): Merging the Internetand the Cellular Worlds, Second Edition. Wiley,February 2006.

    [5] J. Waclawsky. IMS 101: What You Need To KnowNow. IMS 101: Business Communications Review, June2005.

    [6] Open IMS Core.[Online:]http://www.openimscore.org.

    [7] T. Magedanz, D. Witaszek and K. Knuettel. The IMSPlayground @ FOKUS-An Open Testbed for NextGeneration Network Multimedia Services. The FirstInternational Conference on Testbeds and ResearchInfrastructures for the DEvelopment of NeTworks andCOMmunities, February 2005.

    [8] F.C. de Gouveia, T. Magedanz, R. Good and N.Ventura. The Role of Open IMS Testbeds in ComplexService Delivery Platforms. AFRICON, September2007.

    [9] D. Witaszek, F.C. de Gouveia, S. Wahle and T.Magedanz. IMS Playground in Pan-European Networkof Testbeds; Benefits and Challenges. The ThirdInternational Conference on Testbeds and ResearchInfrastructure for the Development of Networks andCommunities, May 2007.

    [10] D. Vingarzan and P. Weik. IMS Signaling overCurrent Wireless Networks: Experiments Using theOpen IMS Core. Vehicular Technology Magazine,IEEE, March 2007.

    [11] J. Rosenberg, H. Schulzrinne and G. Camarillo. SIP:

    Session Initiation Protocol. IETF RFC 3261, June 2002.[12] M. Poikselka, A. Niemi, H. Khartabil and G. Mayer.

    The IMS: IP Multimedia Concepts and Service, SecondEdition. Wiley, March 2006.

    [13] D. Malas. SIP End-to-End Performance Metrics.IETF PMOL Draft-ietf-pmol-sip-perf-metrics-00,February 25, 2008.

    [14] S. Poretsky, V. Gurbani and C. Davids . Terminologyfor Benchmarking Session Initiation Protocol (SIP)Networking Devices. IETF BMWGDraft-poretsky-sip-bench-term-04, November 18, 2007.

    [15] ETSI TISPAN. IMS/NGN Performance Benchmark.TS 186 008, 2007.

    [16] IMS Bench SIPp. [Online:]http:

    //sipp.sourceforge.net/ims_bench/index.html.[17] I. Curcio and M. Lundan. SIP Call Setup Delay in 3G

    Networks. In Proc. IEEE Symp. Comput.Communications 02, Taormina, Italy, July 2002.

    [18] M. Melnyk, A. Jukan and C. Polychronopoulos. ACross-Layer Analysis of Session Setup Delay in IPMultimedia Subsystem (IMS) with EV-DO WirelessTransmission. IEEE TRANSACTIONS ONMULTIMEDIA, VOL. 9, NO. 4, JUNE 2007.

    [19] FOKUS. Open IMS Core Installation Guide.[Online:]http://www.openimscore.org/installation_guide.

    [20] J. Rosenberg and H. Schulzrinne. An Offer/AnswerModel with Session Description Protocol (SDP). IETF

    RFC 3264, June 2002.[21] P. Calhoun, J. Loughney and E. Guttman. Diameter

    Base Protocol. IETF RFC 3588, September 2003.

    [22] 3GPP. Access Security for IP-based Services, V8.1.0.3GPP TS 33.203, December 2007.

    [23] The Open IMS Client (OpenIC).[Online:]http://www.open-ims.org/openic.