MRV Communications MR2228-S2C User Manual Page 26

  • Download
  • Add to my manuals
  • Print
  • Page
    / 40
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 25
240
into a mobile device emulator or a real device. The JAR and JAD files are
the important files used to deploy the MIDlet into the emulated or real devices.
For this study, a Nokia phone emulator, provided with the Sun WTK was used
to emulate the real mobile device. Sun WTK version 2.5 supports the MSA
features, which include the SIP API for J2ME.
ii. Running the IMS Client
The "Run" command on the Sun WTK KToolbar is used to run the MIDlet.
When the MIDlet is started, the registration screen is displayed. As stated
before, registration is the first step towards accessing IMS services. After a
successful registration to the home IMS network, an invite screen, which
allows the user to establish a session, is displayed. After a successful
invitation, the chatting screen is displayed. The chatting screen allows the user
to type text and send to the other remote user. Pressing the “End” command
on the chatting screen can end communication.
6.7 EXPERIMENTAL SETUP
The IMS Client was tested in an experimental setup within the Wireless
Network Lab at I2IT, Pune. The experimental setup is shown on Figure 6.20.
The IMS Testbed comprises the IMS CN, which provides the basic control
layer elements such as: P-CSCF, E-CSCF, S-CSCF and HSS. The Dynamic
Host Configuration Protocol (DHCP) and the Application Server (AS) also form
part of the IMS Testbed. Each IMS network element has its own EPv4
address. The VMware software is used to interact, from the same screen,
with the P-CSCF, I-CSCF and S-CSCF, where each network element can be
restarted or stopped. The HSS uses a separate machine, and with its own EP
address and display.
The experiment was conducted using two identical IMS Clients, hosted from
two different machines, but in the same Local Area Network (LAN), as shown
in Figure 6.20 (B), from the IMS Testbed, two public and private user identities
were created, one for User1 and the other one for User2.
Figure 6.20 (B): Experimental Setup of IMS Testbed
Page view 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 39 40

Comments to this Manuals

No comments