1.1. Basic Concepts
1.1.1. HSS Appearance
1.1.2. HSS Description
1.2. HSS System Architecture
1.2.1. HSS Functionalities
1.2.2. Data in the HSS
1.1.2.1. Administrable Subscriber Data
1.1.2.2. Mobility Data
1.3. Protocols & Reference Points
1.3.1. Diameter Protocol
1.3.2. Mobile Application Part Protocol
1.3.3. Procedures in HSS-IMS Environment
1.3.3.1. Cx Procedures
1.3.3.2 Dx Procedure
1.3.3.3 Sh Procedures
1.3.3.4 Dh Procedures
1.3.4 Procedures in HSS-EPC Environment
1.3.4.1 S6a/S6d Procedures
1.3.4.2. Wx Procedures
1.3.4.3. SWx Procedures
1.3.5 HSS-HLR Interworking
1.3.5.1 Hd Call Flows
1.4. HSS – Database Interworking
1.4.1 User Data Convergence
1.4.2 Database Access Protocols
1.4.1.1 Lightweight Directory Access Protocol
1.4.1.2 Service Provisioning Markup Language
1.4.1.3 Simple Object Access Protocol
2.1. IMS Basic Concepts
2.1.1. IP Multimedia Subsystem Architecture
2.1.2. IP Multimedia Subsystem Identifiers
2.1.3. Call Session Control Functions
2.1.4. IP Multimedia Subsystem Core
2.1.5. Protocol Stacks
2.1.6. Authentication Schemas
2.1.6.1. HTTP Digest
2.1.6.2. AKA
2.1.6.3. AKAv1
2.1.6.4. AKAv2
2.2. HSS-IMS Procedures
2.2.1. Cx Interface Procedures
2.2.1.1. User Authorization
2.2.1.2. Server Assignment
2.2.1.3. Location Retrieval
2.2.1.4. Multimedia Authentication
2.2.1.5. Registration Termination
2.2.1.6. Push Profile
2.2.1.7. IMS Restoration Procedures
2.2.2. Dx Interface Procedures
2.2.2.1. SLF Usage
2.2.3. Sh Interface Procedures
2.2.3.1. Read Transparent/Non Transparent Data
2.2.3.2. Update Transparent Data
2.2.3.3. Subscription For Notifications
2.2.3.4. Notifications Triggers
2.2.4. Dh Interface Procedures
2.2.4.1. SLF Usage
2.2.4.2. Proxy Usage
2.2.5. Zh Interface Procedures
2.2.5.1. General Bootstrapping Architecture
2.2.5.2. General Bootstrapping Architecture Procedure
2.2.5.3. General Bootstrapping Architecture Push Procedure