Transparent session initiated protocol

ABSTRACT

Method and apparatus employing a transparent session initiation protocol (SIP) technique for communication especially between a user device in one domain and an application/service provided in an external domain. The transparent SIP technique is usable in wired or wireless systems such as 3G systems and wireless local area networks (WLANs).

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No. 10/900,941, filed Jul. 28, 2004, which claims the benefit of U.S. Provisional Application Ser. No. 60/582,035 filed Jun. 22, 2004, which are incorporated by reference as if fully set forth.

FIELD OF INVENTION

The present invention relates to session initiation protocol (SIP) in a communication system and, in particular, to an apparatus and method for significantly reducing the number of interfaces required between caller and called agents.

BACKGROUND

A typical SIP scenario involves one or more proxy/re-direct servers as shown in FIG. 1. The “trapezoidal” arrangement shown therein includes a caller (UA1) entity and a called (UA2) entity. The UA1 caller may be anyone of a variety of user equipments (UEs) such as a properly equipped laptop, PDA, wireless cell phone capable of transmitting and receiving data as well as voice, and so forth. One important SIP feature is the ability to invite new participants to a call.

A user is identified in SIP using an SIP uniform resource identifier (URI) which may, for example, be UA1 at Domain (A). The Domain (A) server, Proxy 1, determines an SIP server for Domain (B), in this case, Proxy 2, using directory name service (DNS) procedures. During the message exchange, the caller UA1 and called UA2 entities exchange addresses at which they would like to receive communicated media from each other.

Once session establishment is completed, the caller/called entities can exchange data directly without involvement of the SIP proxies, such as Proxy 1 and Proxy 2. Conventionally, the control signals are communicated as illustrated by control signal lines CS via the proxy servers while the media content is shared as illustrated by media line MS.

Conventional techniques require that users in a particular network must always use the SIP proxy servers of that network operator in order to establish a SIP session. Third party application providers make their servers available to the network operator via open interfaces. The network operator makes these third party servers, and the applications they provide, available to the user via proxy servers within their networks. Typically, the network operator charges the user for access to the service with only a small amount of the revenue passed through to the third party application server provider.

The servers in the operators network are used to provide access to the third party application servers. The network operator controls the use of these servers and as a result, also controls access to the third party application servers. The present invention enhances access to third party application servers from user devices attached to operator networks and also provides the ability to increase the revenue stream for those services to the third party providers.

The objective of the present invention is to address scenarios where SIP is employed for contacting a third party application or content server transparently. The motivation behind this invention is the provision of a transparent means of network traversal to access third party application and content servers located outside of the operators' network.

BRIEF DESCRIPTION OF THE INVENTION

The present invention provides for the utilization of “smart” SIP Proxy Agent Middleware (SPAM) which are preferably integrated into user devices. In a preferred embodiment, all user agents (UAs) in a user device are configured with SPAM as an outbound proxy. A User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests. A user device refers to a physical communication device such as a mobile phone, PDA, laptop or other type of network connectable communication device. There can be more than one User Agent in a user device at any instant of time.

Preferably, the address of the SIP proxy server, which is illustrated in the Figures as Proxy 1 in Domain A, and the address of the internal domain, which is the network operator's domain i.e. Domain A, are provided to SPAM. Depending upon the domain that the UA is trying to contact, SPAM preferably determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain.

The above as well as other objects of the invention will become apparent when reading the accompanying detailed description in conjunction with the drawings in which like elements are designated by like numerals.

BRIEF DESCRIPTION OF THE DRAWING(S)

FIG. 1 is a overview diagram illustrating a conventional SIP scenario employing two proxy/re-direct servers.

FIG. 2 is a simplified diagram utilizing the method and apparatus of the present invention for accessing a third party application server.

FIG. 3 is a detailed flow diagram of a transparent SIP for external domains in accordance with the present invention.

FIG. 4 is a detailed flow diagram of a SIP employed for internal domains.

FIG. 5 is a simplified diagram of both the conventional technique and the technique of the present invention employing a transparent SIP in a wireless local area network (WLAN).

FIGS. 6A and 6B show flow diagrams of conventional Proxy-call state control function (P-CSCF) discovery using dynamic host configuration protocol (DHCP) and directory name service (DNS) and using packet data protocol (PDP) context activation signaling respectively. (Source: 3GPP TS 24.228 V5.6.0 (2003-09).

FIG. 7 is a flow diagram of a conventional mobile originating network with service based local policy and without resource reservation protocol (RRP) for general packet radio service (GPRS) procedures.

FIG. 8 is a simplified diagram of the employment of transparent SIP in third generation (3G) networks.

FIG. 9 is a flow diagram of a mobile switching center transparent SIP for external domains.

FIG. 10 is an illustration of an example user device made in accordance with the teaching of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)

In order to simplify communication between the calling and called entities, the present invention provides method and apparatus which employ an improved session initiation protocol (SIP) for transparently contacting third party applications or content servers. A transparent means of network traversal is provided to access to third party application and content servers located outside of the operator's network.

To accomplish this, “smart” SIP proxy agent middleware (SPAM) is provided in user devices which are conveniently referred to as User Equipments (UEs). In a preferred embodiment, all user agents (UAs) in a UE are manually configured with SPAM as an outbound proxy. A User Agent (UA) is a logical entity that both creates new SIP requests and responds to received SIP requests. A User Equipment (UE) refers to the physical user device such as a mobile phone, PDA, laptop or other type of network connectable communication device which may serve as an SIP terminal. There can be more than one User Agent in a UE at any instant of time.

The address of the SIP proxy server, which, for the example illustrated in FIG. 1, is the proxy server in a domain A, and an internal domain which is the network operator's domain, are provided to SPAM. Depending on the domain that a UA is attempting to contact, SPAM determines whether the request has to be handled internally, i.e., within the network operator's domain or externally, i.e., transparently for networks outside of the operator's domain.

For external domains, i.e., networks outside of the operator's domain, SPAM determines the SIP server of the external domain by, for example, identifying the IP address, port and transport protocol for the external domain's proxy server, such as Proxy 2 in Domain B illustrated in FIGS. 1 and 2, by performing a directory name service (DNS) lookup.

For an internal domain, such as within the network operator's Domain (A), the request is sent to the SIP proxy server, Proxy 1 in Domain A specified by the operator, wherein internal services provided are obtained in a conventional manner.

With reference to FIG. 2, when external services are desired, SPAM provides the SIP uniform resource identifier (URI) for UA1 in the form of a numerical internet protocol (IP) address of an SIP terminal, for instance UA1, at 162.178.9.6, in which the internal domain proxy server, Proxy 1 of Domain A, is omitted when performing SIP transactions. This architecture is utilized when the SIP terminal, i.e. UA1, initiates a call to a third party application/content server. More specifically, in the example of FIG. 2, UA1 utilizes the SIP URI for Proxy 2 of Domain B in order to access services from content server UA2. The control communications links between UA1, Proxy 2 and UA2 are identified as CS, the media communication link which is established is illustrated as MS. Accordingly, SPAM enables the SIP terminal, UA1 to bypass Proxy 1 of Domain A.

Specific example of the processes involved are illustrated in FIGS. 3 and 4 which show a flow diagram of a user device employing transparent SIP for communication with external domains. Although UA1 and SPAM are illustrated separately in FIGS. 3 and 4, preferably they are both implemented in the physical user device employed as the SIP terminal acting as “caller.” At step S1, UA1 sends an invitation signal, Invite, to SPAM. At S1A of FIG. 3, SPAM then identifies the Invite as an external domain. A preferred procedure for the case where SPAM identifies the Invite as a request for internal services is illustrated in FIG. 4.

For the external service case of FIG. 3, at S1B, a DNS lookup is performed by SPAM, such as by SPAM accessing a DNS Server via Proxy 1. Upon obtaining the address of the proxy server of the external domain, in this case Proxy 2 of Domain B, at step S2, an Invite from SPAM is communicated to Proxy 2. At step S3, SPAM preferably reports a 100 “trying” communication to UA1.

Proxy 2, responsive to the Invite from SPAM, communicates, at step S4, an Invite signal to a called third party application server, in this case UA2. Preferably, at step S5, Proxy 2 also sends a 100 “trying” communication to SPAM which may be relayed to UA1.

UA2, responsive to the Invite (step S4), preferably sends a 180 Ringing communication to Proxy 2 at step S6, which, at step S7, preferably sends a 180 Ringing communication to SPAM which, in turn preferably sends a 180 Ringing communication to UA1, at step S8.

Acceptance of the Invite (step S4) by UA2, preferably results in a 200 OK message, at step S9, which is communicated to Proxy 2. Proxy 2 then, at step S10, sends a 200 OK communication to SPAM, which, in turn, sends a 200 OK communication to UA1, at step S11. Responsive to the 200 OK communication (step S11), UA1 sends an acknowledgement (ACK) directly to UA2, at step S12, whereupon a Media session is initiated at step S12A via a conventional link that bypasses the proxy servers.

Upon completion of the media session, UA2 sends a BYE communication to UA1, at step S13 whereupon UA1, at step S14, responds with a 200 OK communication to UA2. Such session termination corresponds with conventional techniques; by definition SIP are protocols which are directed to the control of session initiation.

FIG. 4 is a flow diagram of a preferred method of employing SIP for internal domains wherein UA1, at step S1, sends an invitation signal, Invite, to SPAM which, at step S1A, SPAM identifies the Invite as being directed to an internal domain. At step S2, SPAM sends an Invite to Proxy 1, and preferably, at step S3, sends a 100 Trying communication to UA1. Proxy server, Proxy 1, may be the server which controls the provision of the requested internal service, in which case Proxy 1 continues by directly contacting the “called entity” within the common Domain.

In the case shown in FIG. 4 where another proxy server, Proxy 2, controls the “called entity” UA2 which provides the desired internal services, Proxy 1, responsive to the Invite (step S2), performs a DNS lookup, at step S2A, and sends an Invite to Proxy 2, at step S4, and further sends a 100 Trying communication to SPAM, at step S5. Proxy 2, responsive to the Invite (step S4), sends an Invite to UA2, at step S6 and sends a 100 trying communication to Proxy 1, at step S7. In FIG. 4, UA2 and Proxy 2 are in same domain as UA1 and Proxy 1.

The UA2, at step S8, sends a 180 Ringing communication to Proxy 2 which responds by sending a 180 Ringing communication to Proxy 1, at step S9, Proxy 1 responding thereto by sending a 180 Ringing communication to SPAM, at step S10. SPAM, at step S11, sends a 180 Ringing communication to UA1.

Upon acceptance of the Invite (step S6), UA2 sends a 200 OK communication to Proxy 2, at step S12, Proxy 2 sending a 200 OK communication to Proxy 1, at step S13, and SPAM receiving 200 OK from Proxy 2 at step S14, responding thereto by sending a 200 OK to UA1, at step S15. UA1 responds to the 200 OK by sending an Acknowledgement (ACK) to UA2, at step S16, and a Media session between UA1 and UA2 is set up, at step S16A.

When a session is completed, UA2, at step S17, sends a BYE to UA1 which responds with a 200 OK communication to UA2, at step S18.

The user devices which are configured with the SPAM associated with UAs may be configured for operation within either a wired or wireless embodiment. Accordingly, the user device may take the form of a wireless transmit receive unit (WTRU) configured for use in a wireless network such as a wireless local area network (WLAN) employing one or more of the IEEE 802 family of standards or a Universal Mobile Telecommunications Systems (UMTS) employing code division multiple access (CDMA). The term WTRU includes but is not limited to a user equipment (UE), mobile station, fixed or mobile subscriber unit, pager, or any other type of device capable of operating in a wireless environment.

FIG. 5 is a simplified diagram comparing the conventional SIP technique with the SIP Transparent technique of the present invention in which transparent SIP is utilized in a wireless local area network (WLAN), for example. The conventional control technique is illustrated as a dotted line denoted original control and shows UA1 communicating via an access point (AP) of a WLAN at CC1. The AP in turn communicates via Proxy 1 at CC2. Proxy 1 communicates via an internet protocol (IP) backbone with Proxy 2 at CC3. Proxy 2 communicates with the third party application/content server UA2 at CC4.

Utilization of the control technique of the present invention is illustrated with the lighter weight solid line identified as Modified Control that shows UA1 communicates with the UA2 through the AP, IP backbone and Proxy 2 as indicated by the modified control links MC1, MC2 and MC3. In both cases, the content services provided from UA2 through the IP backbone and the AP to UA1 is shown by the heavy line media connection MM1, MM2. However, using the modified control path, Proxy 1 is bypassed due to the use of the transparent SIP in the WLAN for SIP call control flow.

Conventional SIP call flows emanating in a third generation partnership project (3GPP or 3G) communication system, such as specified in 3GPP Technical Specification 24.228 V5.6.0 (2003-09) are shown in FIGS. 6A and 6B. With reference to FIG. 6A, a UE performs a general packet radio service (GPRS) Attach, performing a PDP context activation procedure, at step S1, which step is conducted with a Proxy-call state control function (P-CSCF) to a Gateway GPRS Support Node (GGSN). An address is obtained using a dynamic host configuration protocol (DHCP) procedure, utilizing DHCP and DNS queries, which take place between the UE and the GGSN, and the GGSN and a DHCP server, as shown at step S2. The DSN query/response takes place in a communication between the UE and a DNS server, at step S3, which steps are conventional.

FIG. 6B shows the manner in which the procedure for P-CSCF discovery is employed using an activate PDP context request. More particularly, the UE at step S1, activates the PDP context request. Responsive thereto, the GGSN at step S2 creates a PDP context request which is communicated to the DHCP server. The DHCP server at step S3, obtains IP addresses of P-CSCF(s). A PDP context response is created by the DHCP server and communicated to the GGSN, at step S4 which, in turn, provides an activate PDP context accept and communicates this to the UE, at step S5.

FIG. 7 shows an example of General Packet Radio Service (GPRS) and Common Open Policy Service (COPS) interactions during a session setup when a service based local policy (SBLP) is applied. FIG. 7 shows a conventional mobile originating network example, such as specified in 3GPP Technical Specification 24.228 V5.6.0 (2003-09). Since a serving CSCF (S-CSCF) is not involved in the GPRS interaction it has been omitted from the flow diagram, but it is assumed that a serving CSCF (S-CSCF) or interrogating CSCF (I-CSCF) is the next entity in the signaling flow and is referred to as a “next entity” in the example as explained below. The GPRS comprises part of a Universal Mobile Telecommunications System (UMTS) access system for UEs configured for use in such a 3G system. The (S-CSCF) and next entities form part of an IP Multi-Media Core Network (CN) Subsystem that interfaces with the Internet.

At step S1, a UE communicates an Invite to a P-CSCF, operating as a Policy Decision Function (PDF). The P-CSCF, at step S2, sends a 100 trying communication to the UE and, at step S3, sends an Invite to the next entity. The next entity, at step S4, sends a 100 trying communication to the P-CSCF and, at step S5, the next entity sends a 183 session progress communication to the P-CSCF. At step S6, the P-CSCF authorizes the Quality of Service (QoS) resources and, at step S7, sends a 183 session progress signal to the UE. The UE, responsive to step S7, sends, at step S8 an acknowledgement signal (PRACK) to the P-CSCF which, at step S9, relays the PRACK to the next entity.

SIP defines two types of responses, provisional and final. Final responses convey the result of the request processing, and are sent reliably. Provisional responses provide information on the progress of the request processing, but are not sent reliably in RFC 3261. It has been observed that reliability is important in several cases, including interoperability scenarios with a Public Switch Telephone Network (PSTN). Therefore, an optional capability was needed to support reliable transmission of provisional responses. That capability is provided by PRACK (refer RFC 3262). Reliable responses are retransmitted by the Transaction User (TU) with an exponential backoff. Those retransmissions cease when a PRACK message is received. The PRACK request plays the same role as ACK, but for provisional responses.

The next entity, at step S10, sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S11. At step S12, the UE sends a GPRS: ACTIVATE PDP context to a Serving GPRS Support Node (SGSN) which, at step S13, sends a GPRS create PDP context to a GGSN, which, at step S14 sends a COPS: request (REQ) activate PDP context to the P-CSCF, which, responsive to step S14, sends a COPS:DEC policy information communication to the GGSN, at step S15. The GGSN, at step S16, sends a COPS:RPT activate PDP context to the P-CSCF and, at step S17, the GGSN sends a GPRS: create PDP response to the SGSN, which, responsive to step S17, sends a GPRS:ACTIVATE PDP context accept to the UE, at step S18.

The UE, at step S19, sends an update to the P-CSCF which relays this to the next entity, at step S20. The next entity, at step S21 sends a 200 OK update to the P-CSCF which relays this message to the UE, at step S22. The next entity, at step S23, also sends a 180 ringing message to the P-CSCF which relays this message to the UE, at step S24. The UE, at step S25, sends an PRACK to the P-CSCF which relays this message to the next entity, at step S26. The next entity, at step S27, sends a 200 OK (PRACK) to the P-CSCF which relays this message to the UE, at step S28.

At step S29, the next entity sends a 200 OK (INVITE) to the P-CSCF which, at step S30, sends a COPS:DEC (open “gate”) to the GGSN. The GGSN, at step S31, sends a COPS:RPT (report outcome) to the P-CSCF, which sends a 200 OK (INVITE) to the UE, at step S32. Responsive thereto, the UE sends an ACK to the P-CSCF, at step S33, which conveys the ACK message to the next entity, at step S34.

FIG. 8 shows a 3G Network in which a conventional control path is shown by dotted line C1 denoted Original Control and a control path in accordance with the present invention is shown by thin solid line C2 denoted modified Control. The media path for both cases is illustrated by heavy solid line M. Using conventional control techniques, such as described in connection with FIG. 7, UA1 interacts with the UMTS access components (which includes the Radio Network Subsystem (RNS), SGSN, GGSN), the IP Multi-Media CN Subsystem (IMS) (which includes the P-CSCF, I-CSCF, S-CSCF) in order to establish a control path via the Internet between UA1 and the proxy server, PROXY 2, and the third party application/content server in the third party domain. Employing the transparent SIP technique of the present invention, the IP Multi-Media CN Subsystem (IMS) is omitted from the control path and the UA1 communicates directly with the PROXY 2 and third-party application/content server employing only the RNS, SGSN and GGSN UMTS access components. The media path M remains the same using the conventional control technique for the transparent SIP technique.

FIG. 9 is a flow-diagram illustrating an example of the transparent SIP technique for external domains employed in a 3G system in which preferably the user agent UA1 and SPAM are implemented in a UE configured for use in a 3G system. Alternatively, SPAM could be embodied in one of the UMTS access components. UA1, at step S1, sends an Invite to SPAM which, at step S1A, identifies the third party application/server (UA2) as being located in an external domain and, at step S1B, invokes a GPRS attach.

The SPAM, at step S1C, establishes PDP context bearer by using a PDP context establishment procedure, which is conventional, and is described at 3GPP TS 24.008. “ACT” in step S1C stands for “PDP Context Activation Procedure.” At step S1D, SPAM performs a DNS lookup, and identifies IP address, port and transport protocol for Proxy 2 in external domain B, by communicating with a DNS server.

The SPAM, at step S1E, then establishes a packet switched (PS) call to Proxy 2 in Domain B. Thereafter, the remaining steps S2 through S14 are conducted between UA1, Proxy 2 and UA2 are substantially identical to those shown and described in FIG. 3, except that, after step S10 and before step S11, the SPAM performs a function of tearing down the PS call to Proxy 2 and establishes a PS call to the third party application server UA2 to implement the transfer of media content. It can be seen from a comparison of FIGS. 7 and 9 that a significant number of steps are eliminated during the control phase as well as eliminating the need for utilization of the entities such as the SGSN and the IP Multimedia CN subsystems.

Significant advantages of the transparent SIP technique for use in 3G networks resides in the fact that IMS is exclusively Internet Protocol Version 6 (IPv6) which provides support for identity and can be used to identify flows and improve QoS. 3GPP IP Multimedia terminals were required to exclusively use IPv6 to access the IMS and the IMS SIP server and proxy server support exclusively IPv6. Hence, all the traffic going to the IMS had to be IPv6, even if the UE is dual stack capable, i.e., is capable of supporting both IPv4 and IPv6 and this impacts both signaling and user traffic. Accordingly, prior to the present invention, there was no means to use SIP-based applications in 3GPP Re199 and Re14 version networks.

Apart from the obvious advantage of providing a transparent means of network traversal to access third party application and content servers located outside of the operator's network, transparent SIP has the following additional advantages when used in a 3G network:

-   The transparent SIP is independent of IP version used, (e.g. IPv4,     IPv6 or later conceived versions). -   Provides a means to use SIP based applications in 3GPP Re199 and     Re14 version networks. -   The SPAM may be integrated into U100 platforms such as the Ericsson     Mobile Platform U100, which is dual mode-enabled and supports both     GPRS for the Global System for Mobile Telecommunications (GSM/GPRS)     and WCDMA. -   The SPAM may be integrated into the U100 Middleware, is not     processor intensive and SIP based applications that use SPAM for     Re14 and Re199 versions of the GPP can also be incorporated therein. -   The SPAM may be advantageously integrated into any other mobile     units of similar capabilities such as an Ericsson U100.

FIG. 10 is a simplified diagram of a UE configured to implement the technique of present invention. The UE 100 preferably comprises a U-100 platform, such as an Ericsson U-100 capable of supporting UMTS. The U-100 platform is dual-mode enabled and supports both GSM/GPSR and WCDMA and has 3G functionality. However, the Erricsson U-100 is merely exemplary of U-100 platforms and the capabilities of the present invention may be incorporated into any other platforms of like functionality and capability.

The UE 100 preferably includes hardware (HW) for network access services, data communication services, multimedia interface services, application platform services and operation and related services respectively shown at 142A through 146A. The UE 100 also preferably includes software supporting these services being shown respectively at 142B through 146B. Middleware services 149 are preferably implemented in connection with a platform application programming interface (API) as well as the open archives, open application framework (OAF) which is integrated into the middleware services and functions to manage all interfaces of the platform with the underlying services. For example, the user interface (UA1) 150, which is/may be JAVA-based, enables a user to operate the mobile terminal to turn on, turn off, input data, select from among stored menus, etc. may, when the platform takes the form of a cell phone, have a conventional telephone keypad together with other operating buttons to provide on/off, scan, mode selection and other typical functions. Alternatively, the manual interface may be a keyboard type input or the manual input may be a touch screen type or the like. The user interface 150 is managed by the OAF 149. The user interface 150 need not be Java-based and may support any other suitable programming language. The SPAM 160 is preferably integrated into the UE middleware to enhance the U-100 platform.

Although the features and elements of the present invention are described in the preferred embodiments in particular combinations, each feature or element can be used alone (without the other features and elements of the preferred embodiments) or in various combinations with or without other features and elements of the present invention. 

1. A method employed by a user device (UE) having a proxy agent and being capable of support by a third generation (3G) system, said method enabling the UE in one domain to communication with a third party application/content server in a domain external to the user device, the method comprising: the user device: generating an Invite communication; the proxy agent: invoking a general packet radio service (GPRS) attach responsive to said Invite communication; establishing a packet data protocol (PDP) context bearer employing a PDP context establishment procedure; performing a directory name service (DNS) lookup and identifying the IP address, port and transport protocol for a Proxy 2 in the external domain; establishing a packet switch (PS) call to a proxy server (Proxy 2) in said external domain; and transmitting an Invite communication to said Proxy 2 to initiate a media session directly between said UE and said third party application/content server (AS).
 2. The method of claim 1 wherein the Proxy 2: provides an invite communication to the AS; and said AS: initiates a session with the UE.
 3. A user device (UE) configured for operation in a first wireless domain having a capability to directly communicate with an application/content server (AS) in a second wireless domain outside of said first domain, the UE comprising: a mobile platform configured to support 3GPP, said mobile platform being further configured to: identify an Invite communication as intended for an external domain responsive to an Invite communication initiated by the UE; invoke a general packet radio service (GPRS) attach; perform a packet data protocol (PDP) context establishment procedure; perform a directory name service (DNS) lookup and identify an IP address, port and transport protocol for a Proxy 2 in the second domain; and establish a packet switched (PS) call to said Proxy 2 in said second domain.
 4. The UE of claim 3 configured as a wireless UE wherein said mobile platform is a U-100 mobile platform.
 5. The UE of claim 3 wherein the mobile platform is configured to support GPRS for the Global System for Mobile Telecommunications (GSM/GPRS) and wideband code division multiple access (WCDMA).
 6. The UE of claim 3 wherein said mobile platform configured for dual-mode use.
 7. A wireless transmit receive unit (WTRU) having a proxy agent for wireless communication within a wireless network system and configured to operate in selected domain and to communicate with a third party application/content server in an external domain that is external to the selected domain, the WTRU being further configured to generate an Invite communication; said proxy agent being configured to: invoke a general packet radio service (GPRS) attach responsive to said Invite communication; establish a packet data protocol (PDP) context bearer employing a PDP context establishment procedure; perform a directory name service (DNS) lookup and identifying the IP address, port and transport protocol for a proxy server (Proxy 2) in the external domain; establish a packet switch (PS) call to the Proxy 2 in the external domain; and transmit an Invite communication to the Proxy 2 to initiate a media session directly between the WTRU and the third party application/content server. 