Covid 19 Update: Given the current global situation, we have paused the delivery of our LiveOnsite courses, but our LiveOnline and OnlineAnytime Packages remain unaffected. Browse over 50 online courses in our course catalogue, or get in touch to register your interest in future LiveOnsite courses when we are able to safely resume in person training.

THIG - Topology Hiding Inter-working Gateway

Signalling emanating from the home IMS (IP Multimedia Subsystem) may be protected through topology hiding. This increases the robustness of the IMS in terms of security. Since functions outside the trust domain of the home IMS have no view of the URI (Uniform Resource Identifiers) that are used to address functions such as the S-CSCF (Serving – Call Session Control Function) or MGCF (Media Gateway Control Functions). The basic process in which topology hiding is implemented is through the encryption of any URI that relates to functions within the home IMS, in SIP signalling messages leaving the network. These include: Via – used to route responses relating to a specific request; Route – indicating the path subsequent signalling messages should take; Record Route – a list of SIP agents that have proxied the specific message.


  • Fully interactive 3GPP based network map
  • Narrated call flows
  • Detailed network procedures

Explore NetX today with a
free trial.
More Info about NetX