SlideShare a Scribd company logo
1 of 14
Introduction:
Session Initiation Protocol (SIP)
          Aung Thu Rha Hein(g5536871)
Agenda
       Overview of SIP
       SIP Functions & Features
       SIP Architecture
           SIP Components
           SIP Server Modes
       Sample SIP call scenario
       SIP Requests & Responses
       Protocols used with SIP
       Summary & Conclusion



    2
Overview of SIP

       A signaling protocol used to create, manage and
        terminate sessions in IP network
       A standard protocol defined by IETF
       IETF mapped it as Application-layer protocol in OSI
        layer
       Similar to HTTP & SMTP protocol in syntax
           URI: SPI: aung@mahidol.com
       It is extensible
       But doesn’t provide end-to-end functionality

    3
SIP Functions & Features
       User Location
           Address Resolution: translate URIs to current IP address
       User Availability
           User can control certain types of communication status
       User Capabilities
           Determining the features available by both parties’
            programs
       Session Setup
           a three-way handshake
       Session Management
           Able to modify session in use

    4
SIP Functions & Features(Cont. )
       Registration
           Users can register themselves using their ID, independent
            from the device registration
       Redirect
           SIP server can redirect a request to another address
       Forking
           Request forwarding: Serial & Parallel Forking
       Proxy
           Proxy server can forward the request of the user to
            another one
       Mobility
           SIP calls can set up if proper gateways are provided

    5
SIP Architecture
       SIP Components
           User Agents
               Can act as User Agent Client (UAC) and User Agent Server (UAS)
               SIP Endpoints: Softphone, SIP phone, Smart Phone, PDA
           SIP Servers
               Registrar
                   Authenticate and register UA’s location and status
               Proxy
                   Forward request to other computers. Involve in session setup and
                    teardown
               Redirect
                   Redirect clients to UAs they are attempting to contact. Also can fork a
                    call.
           Location Services
               A database that used to keep information about users’ registration
                and their locations


    6
SIP Architecture(cont.)
       SIP Server Modes
         Stateful vs Stateless
               SIP server can run in one of these two modes
               Stateful server keep track of all requests and responses
               Stateless server found as part of backbone
           Client/server vs P2P




    7
Sample SIP call scenario
       SIP Registration




    8
Sample SIP call scenario(cont.)
       Request through Proxy server




    9
Sample SIP call scenario(cont.)
    Request through Redirect server




    10
SIP Requests & Responses
SIP Request Packet
INVITE sip:14158867900@me.com:5060SIP/2.0
From: ”ALICE" <sip:9184249378@67.231.5.6>
To: <sip:14158867900@108.166.22.22>
Contact: <sip:9184249378@67.231.5.6:1234>
Call-ID: 490dffec2cafa2772a11eec8716e
CSeq: 102 INVITE
User-Agent: middleserver
Max-­­Forwards: 30
Allow: INVITE,ACK, CANCEL, OPTIONS, BYE,REFER, SUBSCRIBE
Content-Type: application/sdp
Content-Length:180



11
SIP Requests & Responses
     SIP Response Packet
     SIP/2.0 100 Trying (180 Ringing, 200 OK)
     From: ”BOB" <sip:9184249378@67.231.5.6>
     To: <sip:14158867900@108.166.22.22>
     Call-ID: 490dffec2cafa2772a11eec8716e
     CSeq: 102 INVITE
     User-Agent: middleserver
     Max-­­Forwards: 30
     Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBEBYE, REFER,
     SUBSCRIBE
     1xx :             Informational
     2xx Success:      request successful
     3xx Redirection : request should tried another location
     4xx Client Error: an error in request
     5xx Server Error: an error in recipient
     6xx Global Failure : request has failed and should not be retried again
12
Protocols used with SIP
 User Datagram Protocol (UDP)
   used to send datagrams over IP network
 Transport Layer Security (TLS)
   provides security between applications
 Session Description Protocol (SDP)
   used to send description information when sending multimedia
    data
 Real-Time Transport Protocol (RTP)
   used to transport real-time data across a network
 Media Gateway Control Protocol (MGCP)
   used to control gateways that provide access to the PSTN
 Real-Time Streaming Protocol (RTSP)
   used to control the delivery of streaming media
 SIMPLE (SIP for Instant Messaging and Presence Leveraging
  Extensions)
 13
Summary & Conclusion

    A fundamental building block for real-time
     communication
    SIP is an open standard and development
     community is trying for higher interoperability
    Research going for further enchantments and
     solutions to known issues




    14

More Related Content

What's hot

Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysischinmaypadhye1985
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesOxfordCambridge
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIPLaraib Khan
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...ALTANAI BISHT
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sipAnna Volynkina
 
Sip call flows all cases ccmigration
Sip call flows all cases ccmigrationSip call flows all cases ccmigration
Sip call flows all cases ccmigrationcoolrahul28
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 

What's hot (20)

SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysis
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
Session initiation protocol SIP
Session initiation protocol SIPSession initiation protocol SIP
Session initiation protocol SIP
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
 
Sip call flows all cases ccmigration
Sip call flows all cases ccmigrationSip call flows all cases ccmigration
Sip call flows all cases ccmigration
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
IMS Signaling Details
IMS Signaling DetailsIMS Signaling Details
IMS Signaling Details
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
Aboutsip - SIP Routing
Aboutsip - SIP RoutingAboutsip - SIP Routing
Aboutsip - SIP Routing
 

Similar to Introduction to Session Initiation Protocol (SIP

1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
Sip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaperSip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepapersirajsamad
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1Carl Ford
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocolkshitijmehta23
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationmatrixtelesol
 
Implementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolImplementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolIOSR Journals
 

Similar to Introduction to Session Initiation Protocol (SIP (20)

1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Sip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaperSip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaper
 
Scall
ScallScall
Scall
 
Sip summary
Sip summarySip summary
Sip summary
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Session intiation protocol tk
Session intiation protocol tkSession intiation protocol tk
Session intiation protocol tk
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1
 
Aarti Sip
Aarti SipAarti Sip
Aarti Sip
 
Aarti sip
Aarti sipAarti sip
Aarti sip
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 
Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Voip security
Voip securityVoip security
Voip security
 
Sip
SipSip
Sip
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
SIP Presentation
SIP PresentationSIP Presentation
SIP Presentation
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Implementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolImplementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation Protocol
 

More from Aung Thu Rha Hein

Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Aung Thu Rha Hein
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Aung Thu Rha Hein
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Aung Thu Rha Hein
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityAung Thu Rha Hein
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital ForensicAung Thu Rha Hein
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression VerificationAung Thu Rha Hein
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsAung Thu Rha Hein
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtAung Thu Rha Hein
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentAung Thu Rha Hein
 

More from Aung Thu Rha Hein (19)

Writing with ease
Writing with easeWriting with ease
Writing with ease
 
Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic Opportunity
 
Network switching
Network switchingNetwork switching
Network switching
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital Forensic
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression Verification
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
TPC-H in MongoDB
TPC-H in MongoDBTPC-H in MongoDB
TPC-H in MongoDB
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaught
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessment
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Chat bot analysis
Chat bot analysisChat bot analysis
Chat bot analysis
 
Data mining & column stores
Data mining & column storesData mining & column stores
Data mining & column stores
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Introduction to Session Initiation Protocol (SIP

  • 1. Introduction: Session Initiation Protocol (SIP) Aung Thu Rha Hein(g5536871)
  • 2. Agenda  Overview of SIP  SIP Functions & Features  SIP Architecture  SIP Components  SIP Server Modes  Sample SIP call scenario  SIP Requests & Responses  Protocols used with SIP  Summary & Conclusion 2
  • 3. Overview of SIP  A signaling protocol used to create, manage and terminate sessions in IP network  A standard protocol defined by IETF  IETF mapped it as Application-layer protocol in OSI layer  Similar to HTTP & SMTP protocol in syntax  URI: SPI: aung@mahidol.com  It is extensible  But doesn’t provide end-to-end functionality 3
  • 4. SIP Functions & Features  User Location  Address Resolution: translate URIs to current IP address  User Availability  User can control certain types of communication status  User Capabilities  Determining the features available by both parties’ programs  Session Setup  a three-way handshake  Session Management  Able to modify session in use 4
  • 5. SIP Functions & Features(Cont. )  Registration  Users can register themselves using their ID, independent from the device registration  Redirect  SIP server can redirect a request to another address  Forking  Request forwarding: Serial & Parallel Forking  Proxy  Proxy server can forward the request of the user to another one  Mobility  SIP calls can set up if proper gateways are provided 5
  • 6. SIP Architecture  SIP Components  User Agents  Can act as User Agent Client (UAC) and User Agent Server (UAS)  SIP Endpoints: Softphone, SIP phone, Smart Phone, PDA  SIP Servers  Registrar  Authenticate and register UA’s location and status  Proxy  Forward request to other computers. Involve in session setup and teardown  Redirect  Redirect clients to UAs they are attempting to contact. Also can fork a call.  Location Services  A database that used to keep information about users’ registration and their locations 6
  • 7. SIP Architecture(cont.)  SIP Server Modes  Stateful vs Stateless  SIP server can run in one of these two modes  Stateful server keep track of all requests and responses  Stateless server found as part of backbone  Client/server vs P2P 7
  • 8. Sample SIP call scenario  SIP Registration 8
  • 9. Sample SIP call scenario(cont.)  Request through Proxy server 9
  • 10. Sample SIP call scenario(cont.)  Request through Redirect server 10
  • 11. SIP Requests & Responses SIP Request Packet INVITE sip:14158867900@me.com:5060SIP/2.0 From: ”ALICE" <sip:9184249378@67.231.5.6> To: <sip:14158867900@108.166.22.22> Contact: <sip:9184249378@67.231.5.6:1234> Call-ID: 490dffec2cafa2772a11eec8716e CSeq: 102 INVITE User-Agent: middleserver Max-­­Forwards: 30 Allow: INVITE,ACK, CANCEL, OPTIONS, BYE,REFER, SUBSCRIBE Content-Type: application/sdp Content-Length:180 11
  • 12. SIP Requests & Responses SIP Response Packet SIP/2.0 100 Trying (180 Ringing, 200 OK) From: ”BOB" <sip:9184249378@67.231.5.6> To: <sip:14158867900@108.166.22.22> Call-ID: 490dffec2cafa2772a11eec8716e CSeq: 102 INVITE User-Agent: middleserver Max-­­Forwards: 30 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBEBYE, REFER, SUBSCRIBE 1xx : Informational 2xx Success: request successful 3xx Redirection : request should tried another location 4xx Client Error: an error in request 5xx Server Error: an error in recipient 6xx Global Failure : request has failed and should not be retried again 12
  • 13. Protocols used with SIP  User Datagram Protocol (UDP)  used to send datagrams over IP network  Transport Layer Security (TLS)  provides security between applications  Session Description Protocol (SDP)  used to send description information when sending multimedia data  Real-Time Transport Protocol (RTP)  used to transport real-time data across a network  Media Gateway Control Protocol (MGCP)  used to control gateways that provide access to the PSTN  Real-Time Streaming Protocol (RTSP)  used to control the delivery of streaming media  SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions) 13
  • 14. Summary & Conclusion  A fundamental building block for real-time communication  SIP is an open standard and development community is trying for higher interoperability  Research going for further enchantments and solutions to known issues 14