SIP: Understanding the Session Initiation Protocol, Third Edition

Total Page:16

File Type:pdf, Size:1020Kb

SIP: Understanding the Session Initiation Protocol, Third Edition SIP: Understanding the Session Initiation Protocol Third Edition For a complete listing of titles in the Artech House Telecommunications Series, turn to the back of this book. SIP: Understanding the Session Initiation Protocol Third Edition Alan B. Johnston Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. Cover design by Yekaterina Ratner Cover art by Lisa Johnston ISBN 13: 978-1-60783-995-8 © 2009 ARTECH HOUSE 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including pho- tocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. 10 9 8 7 6 5 4 3 2 1 For Lisa Contents Foreword to the First Edition xxi Preface to the Third Edition xxiii Preface to the Second Edition xxv Preface to the First Edition xxvii 1 SIP and the Internet 1 1.1 Signaling Protocols 1 1.2 Internet Multimedia Protocol Stack 2 1.2.1 Physical Layer 2 1.2.2 Data/Link Layer 2 1.2.3 Network Layer 3 1.2.4 Transport Layer 4 1.2.5 Application Layer 9 1.2.6 Utility Applications 9 1.2.7 Multicast 10 1.3 Internet Names 11 1.4 URLs, URIs, and URNs 11 1.5 Domain Name Service 13 1.5.1 DNS Resource Records 14 1.5.2 Address Resource Records (A or AAAA) 15 vii viii SIP: Understanding the Session Initiation Protocol 1.5.3 Service Resource Records (SRV) 15 1.5.4 Naming Authority Pointer Resource Records (NAPTR) 16 1.5.5 DNS Resolvers 16 1.6 Global Open Standards 17 1.7 Internet Standards Process 18 1.8 A Brief History of SIP 20 1.9 Conclusion 21 References 21 2 Introduction to SIP 23 2.1 A Simple Session Establishment Example 23 2.2 SIP Call with a Proxy Server 31 2.3 SIP Registration Example 36 2.4 SIP Presence and Instant Message Example 38 2.5 Message Transport 43 2.5.1 UDP Transport 43 2.5.2 TCP Transport 45 2.5.3 TLS Transport 46 2.5.4 SCTP Transport 46 2.6 Transport Protocol Selection 47 2.7 Conclusion 48 2.8 Questions 48 References 50 3 SIP Clients and Servers 51 3.1 SIP User Agents 51 3.2 Presence Agents 52 3.3 Back-to-Back User Agents 53 3.4 SIP Gateways 54 3.5 SIP Servers 56 3.5.1 Proxy Servers 56 3.5.2 Redirect Servers 61 3.5.3 Registrar Servers 63 3.6 Uniform Resource Indicators 64 3.7 Acknowledgment of Messages 65 Contents ix 3.8 Reliability 66 3.9 Multicast Support 68 3.10 Conclusion 69 3.11 Questions 69 References 72 4 SIP Request Messages 73 4.1 Methods 73 4.1.1 INVITE 73 4.1.2 REGISTER 76 4.1.3 BYE 78 4.1.4 ACK 78 4.1.5 CANCEL 81 4.1.6 OPTIONS 82 4.1.7 SUBSCRIBE 84 4.1.8 NOTIFY 87 4.1.9 PUBLISH 88 4.1.10 REFER 91 4.1.11 MESSAGE 94 4.1.12 INFO 96 4.1.13 PRACK 97 4.1.14 UPDATE 99 4.2 URI and URL Schemes Used by SIP 100 4.2.1 SIP and SIPS URIs 101 4.2.2 Telephone URLs 102 4.2.3 Presence and Instant Messaging URLs 104 4.3 Tags 104 4.4 Message Bodies 105 4.5 Conclusion 107 4.6 Questions 107 References 108 5 SIP Response Messages 111 5.1 Informational 112 5.1.1 100 Trying 112 5.1.2 180 Ringing 113 x SIP: Understanding the Session Initiation Protocol 5.1.3 181 Call is Being Forwarded 113 5.1.4 182 Call Queued 113 5.1.5 183 Session Progress 113 5.2 Success 114 5.2.1 200 OK 114 5.2.2 202 Accepted 115 5.2.3 204 No Notifi cation 115 5.3 Redirection 115 5.3.1 300 Multiple Choices 115 5.3.2 301 Moved Permanently 116 5.3.3 302 Moved Temporarily 116 5.3.4 305 Use Proxy 116 5.3.5 380 Alternative Service 116 5.4 Client Error 116 5.4.1 400 Bad Request 116 5.4.2 401 Unauthorized 117 5.4.3 402 Payment Required 117 5.4.4 403 Forbidden 117 5.4.5 404 Not Found 118 5.4.6 405 Method Not Allowed 118 5.4.7 406 Not Acceptable 118 5.4.8 407 Proxy Authentication Required 118 5.4.9 408 Request Timeout 119 5.4.10 409 Confl ict 119 5.4.11 410 Gone 119 5.4.12 411 Length Required 119 5.4.13 412 Conditional Request Failed 119 5.4.14 413 Request Entity Too Large 120 5.4.15 414 Request-URI Too Long 120 5.4.16 415 Unsupported Media Type 120 5.4.17 416 Unsupported URI Scheme 120 5.4.18 417 Unknown Resource Priority 120 5.4.19 420 Bad Extension 121 5.4.20 421 Extension Required 121 5.4.21 422 Session Timer Interval Too Small 121 5.4.22 423 Interval Too Brief 121 Contents xi 5.4.23 428 Use Identity Header 121 5.4.24 429 Provide Referror Identity 122 5.4.25 430 Flow Failed 122 5.4.26 433 Anonymity Disallowed 122 5.4.27 436 Bad Identity-Info Header 122 5.4.28 437 Unsupported Certifi cate 122 5.4.29 438 Invalid Identity Header 123 5.4.30 439 First Hop Lacks Outbound Support 123 5.4.31 440 Max-Breadth Exceeded 123 5.4.32 470 Consent Needed 123 5.4.33 480 Temporarily Unavailable 123 5.4.34 481 Dialog/Transaction Does Not Exist 123 5.4.35 482 Loop Detected 124 5.4.36 483 Too Many Hops 124 5.4.37 484 Address Incomplete 125 5.4.38 485 Ambiguous 125 5.4.39 486 Busy Here 126 5.4.40 487 Request Terminated 126 5.4.41 488 Not Acceptable Here 126 5.4.42 489 Bad Event 126 5.4.43 491 Request Pending 126 5.4.44 493 Request Undecipherable 127 5.4.45 494 Security Agreement Required 127 5.5 Server Error 128 5.5.1 500 Server Internal Error 128 5.5.2 501 Not Implemented 128 5.5.3 502 Bad Gateway 128 5.5.4 503 Service Unavailable 128 5.5.5 504 Gateway Timeout 128 5.5.6 505 Version Not Supported 129 5.5.7 513 Message Too Large 129 5.5.8 580 Preconditions Failure 129 5.6 Global Error 129 5.6.1 600 Busy Everywhere 129 5.6.2 603 Decline 129 5.6.3 604 Does Not Exist Anywhere 130 xii SIP: Understanding the Session Initiation Protocol 5.6.4 606 Not Acceptable 130 5.7 Questions 130 References 131 6 SIP Header Fields 133 6.1 Request and Response Header Fields 134 6.1.1 Accept 134 6.1.2 Accept-Encoding 134 6.1.3 Accept-Language 136 6.1.4 Alert-Info 136 6.1.5 Allow 137 6.1.6 Allow-Events 137 6.1.7 Answer-Mode 137 6.1.8 Call-ID 137 6.1.9 Contact 138 6.1.10 CSeq 140 6.1.11 Date 141 6.1.12 Encryption 141 6.1.13 Expires 141 6.1.14 From 141 6.1.15 History Info 142 6.1.16 Organization 143 6.1.17 Path 143 6.1.18 Priv-Answer-Mode 143 6.1.19 Record-Route 144 6.1.20 Recv-Info 144 6.1.21 Refer-Sub 144 6.1.22 Retry-After 145 6.1.23 Subject 145 6.1.24 Supported 146 6.1.25 Timestamp 147 6.1.26 To 147 6.1.27 User-Agent 147 6.1.28 Via 148 6.2 Request Header Fields 149 6.2.1 Accept-Contact 149 Contents xiii 6.2.2 Authorization 150 6.2.3 Call-Info 150 6.2.4 Event 150 6.2.5 Hide 151 6.2.6 Identity 151 6.2.7 Identity-Info 151 6.2.8 In-Reply-To 151 6.2.9 Info-Package 152 6.2.10 Join 152 6.2.11 Priority 153 6.2.12 Privacy 153 6.2.13 Proxy-Authorization 153 6.2.14 Proxy-Require 154 6.2.15 P-OSP-Auth-Token 155 6.2.16 P-Asserted-Identity 155 6.2.17 P-Preferred-Identity 155 6.2.18 Max-Breadth 155 6.2.19 Max-Forwards 156 6.2.20 Reason 156 6.2.21 Refer-To 156 6.2.22 Referred-By 157 6.2.23 Reply-To 157 6.2.24 Replaces 158 6.2.25 Reject-Contact 158 6.2.26 Request-Disposition 159 6.2.27 Require 159 6.2.28 Resource-Priority 160 6.2.29 Response-Key 160 6.2.30 Route 160 6.2.31 RAck 161 6.2.32 Security-Client 161 6.2.33 Security-Verify 162 6.2.34 Session-Expires 162 6.2.35 SIP-If-Match 162 6.2.36 Subscription-State 162 6.2.37 Suppress-If-Match 163 6.2.38 Target-Dialog 163 xiv SIP: Understanding the Session Initiation Protocol 6.2.39 Trigger-Consent 163 6.3 Response Header Fields 163 6.3.1 Accept-Resource-Priority 163 6.3.2 Authentication-Info 164 6.3.3 Error-Info 164 6.3.4 Flow-Timer 165 6.3.5 Min-Expires 165 6.3.6 Min-SE 165 6.3.7 Permission-Missing 165 6.3.8 Proxy-Authenticate 166 6.3.9 Security-Server 166 6.3.10 Server 166 6.3.11 Service-Route 166 6.3.12 SIP-ETag 167 6.3.13 Unsupported 167 6.3.14 Warning 167 6.3.15 WWW-Authenticate 168 6.3.16 RSeq 168 6.4 Message Body Header Fields 169 6.4.1 Content-Encoding 169 6.4.2 Content-Disposition 169 6.4.3 Content-Language 170 6.4.4 Content-Length 170 6.4.5 Content-Type 170 6.4.6 MIME-Version 171 6.5 Questions 171 References 172 7 Wireless, Mobility, and IMS 177 7.1 IP Mobility 177 7.2 SIP Mobility 178 7.3 IMS and SIP 184 7.4 IMS Header Fields 186 7.5 Conclusion 186 7.6 Questions 187 References 187 Contents xv 8 Presence and Instant Messaging 189 8.1 Introduction 189 8.2 History of IM and Presence 189 8.3 SIMPLE 191 8.4 Presence with SIMPLE 191 8.4.1 SIP Events Framework 191 8.4.2 Presence Bodies 192 8.4.3 Resource Lists 194 8.4.4 Filtering 200 8.4.5 Conditional Event Notifi cations and ETags 201 8.4.6 Partial Publication 202 8.4.7 Presence Documents Summary 204 8.5 Instant Messaging with SIMPLE 205 8.5.1 Page Mode Instant Messaging 205 8.5.2 Common Profi le for Instant Messaging 205 8.5.3 Instant Messaging Delivery Notifi cation 206 8.5.4 Message Composition Indication 208 8.5.5 Multiple Recipient Messages 209 8.5.6 Session Mode Instant Messaging 210 8.6 Jabber 213 8.6.1 Standardization as Extensible Messaging and Presence Protocol 213 8.6.2 Interworking with SIMPLE 214 8.6.3 Jingle 214 8.6.4 Future Standardization of XMPP 214 8.7 Conclusion 214 8.8 Questions 215 References 216 9 Services in SIP 219 9.1 Gateway Services 219 9.2 SIP Trunking 221 9.3 SIP Service Examples 221 9.4 Voicemail 223 9.5 SIP Video 225 xvi SIP: Understanding the Session Initiation Protocol 9.6 Facsimile 226 9.7 Conferencing 227 9.7.1 Focus
Recommended publications
  • Avaya Session Border Controller for Enterprise Overview and Specification
    Avaya Session Border Controller for Enterprise Overview and Specification Release 7.2.2.2 Issue 8 April 2019 © 2017-2019, Avaya Inc. YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA such modifications, additions, or deletions were performed by or on AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • Security Management Fundamentals Release: 6.0 Document Revision: 03.08
    Nortel Communication Server 1000 Security Management Fundamentals Release: 6.0 Document Revision: 03.08 www.nortel.com .NN43001-604 Nortel Communication Server 1000 Release: 6.0 Publication: NN43001-604 Document release date: 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 11 Other changes 11 Revision history 11 How to get help 15 Getting help from the Nortel Web site 15 Getting help over the telephone from a Nortel Solutions Center 15 Getting help from a specialist by using an Express Routing Code 16 Getting help through a Nortel distributor or reseller 16 Introduction 17 Purpose 17 Navigation 18 Other security information 18 About this document 19 Subject 19 Intended audience 20 Terminology conventions 20 Fundamentals of system security management 21 System security overview 23 General signaling security overview 23 Key management concepts 23 Public-key certificate concepts 25 Platform security overview 28 Unified Communications Management security services 28 Unified Communications Management security server roles 29 Security Domain Manager concepts 30 Linux security hardening 31 Internal communications security overview 36 ISSS/IPsec 36 Secure File Transfer Protocol concepts 38 Port access restrictions concepts 40 Linux Master Firewall Control 41 Media and signaling security overview 42 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks.
    [Show full text]
  • Configuring 9600 Series SIP Telephones with Avaya Auratm Session Manager Release 6.0 and Avaya Auratm Communication Manager Evolution Server Release 6.0 – Issue 1.0
    Avaya Solution Interoperability Test Lab Configuring 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 and Avaya AuraTM Communication Manager Evolution Server Release 6.0 – Issue 1.0 Abstract These Application Notes describe the configuration of 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 supported by Avaya AuraTM Communication Manager Evolution Server Release 6.0. Avaya AuraTM Session Manager provides SIP proxy/routing functionality, routing SIP sessions across a TCP/IP network with centralized routing policies and registrations for SIP endpoints. Avaya AuraTM Communication Manager Evolution Server serves as an Evolution Server within the Avaya Aura™ Session Manager architecture and supports the SIP endpoints registered to Avaya AuraTM Session Manager. These Application Notes provide information for the setup, configuration, and verification of the call flows tested on this solution. DJH Reviewed: Solution Interoperability Lab Application Notes 1 of 51 SPOC 10/1/2010 ©2010 Avaya Inc. All Rights Reserved. SM6_CM-ES_R6 Table of Contents: 1. Introduction ............................................................................................................. 4 2. Equipment and Software Validated......................................................................... 5 3. Configure Avaya AuraTM Communication Manager ................................................ 6 3.1. Verify System Capacities and Licensing ................................................................. 6 3.1.1.
    [Show full text]
  • NICC ND 1035 V2.1.1 (2016-02) NICC Document
    NICC ND 1035 V2.1.1 (2016-02) NICC Document SIP Network to Network Interface Signalling NICC Standards Limited Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636 Registered in England and Wales under number 6613589 2 NICC ND 1035 V2.1.1 (2016 -02) NOTICE OF COPYRIGHT AND LIABILITY © 2016 NICC Standards Limited The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be that printing on NICC printers of the PDF version kept on a specific network drive within the NICC. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other NICC documents is available at: http://www.niccstandards.org.uk/publications/ If you find errors in the present document, please send your comments to: mailto:[email protected] Copyright All right, title and interest in this document are owned by NICC Standards Limited (“NICC”) and/or the contributors to the document (unless otherwise indicated that copyright is owned or shared with a third party). Such title and interest is protected by United Kingdom copyright laws and international treaty provisions. The contents of the document are believed to be accurate at the time of publishing, but no representation or warranty is given as to their accuracy, completeness or correctness.
    [Show full text]
  • Security Management Fundamentals
    Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 . Document status: Standard Document version: 01.46 Document date: 31 October 2007 Copyright © 2008, Nortel Networks All Rights Reserved. LEGAL NOTICE While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Sourced in Canada Nortel, the Nortel Logo, the Globemark, SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. Entrust is a trademark of Entrust, Inc. Verisign and Thawte are trademarks of Verisign, Inc. VxWorks is a trademark of Wind River Systems, Inc. All other trademarks are the property of their respective owners. 3 Revision History October 2007 Standard 01.46 This document is up-issued to support Communication Server 1000 (CS 1000) Release 5.0, and to reflect changes in technical content related to password reset procedures. October 2007 Standard 01.42 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content related to Intrasystem Signaling Security Solution (ISSS) configuration. September 2007 Standard 01.34 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content related primarily to ISSS configuration. June 2007 Standard 01.13 This document is up-issued to support CS 1000 Release 5.0, and to reflect changes in technical content, including changes to information about SIP TLS and ISSS configuration.
    [Show full text]
  • NBAR2 Standard Protocol Pack 1.0
    NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device.
    [Show full text]
  • HT801/HT802 Analog Telephone Adaptors Administration Guide
    Grandstream Networks, Inc. HT801/HT802 Analog Telephone Adaptors Administration Guide COPYRIGHT ©2021 Grandstream Networks, Inc. http://www.grandstream.com All rights reserved. Information in this document is subject to change without notice. Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted. The latest electronic version of this user manual is available for download here: http://www.grandstream.com/support Grandstream is a registered trademark and Grandstream logo is trademark of Grandstream Networks, Inc. in the United States, Europe and other countries. CAUTION Changes or modifications to this product not expressly approved by Grandstream, or operation of this product in any way other than as detailed by this User Manual, could void your manufacturer warranty. WARNING Please do not use a different power adaptor with your devices as it may cause damage to the products and -void the manufacturer warranty. P a g e | 1 HT801/HT802 Administration Guide Version 1.0.29.8 GNU GPL INFORMATION HT801/HT802 firmware contains third-party software licensed under the GNU General Public License (GPL). Grandstream uses software under the specific terms of the GPL. Please see the GNU General Public License (GPL) for the exact terms and conditions of the license. Grandstream GNU GPL related source code can be downloaded from Grandstream web site from: http://www.grandstream.com/support/faq/gnu-general-public-license/gnu-gpl-information-download P a g e | 2 HT801/HT802 Administration Guide Version 1.0.29.8 Table of Content DOCUMENT PURPOSE ................................................................................................
    [Show full text]
  • Ts 103 389 V1.2.1 (2013-09)
    ETSI TS 103 389 V1.2.1 (2013-09) Technical Specification Railway Telecommunications (RT); Global System for Mobile communications (GSM); Usage of Session Initiation Protocol (SIP) on the Network Switching Subsystem (NSS) to Fixed Terminal Subsystem (FTS) interface for GSM Operation on Railways 2 ETSI TS 103 389 V1.2.1 (2013-09) Reference RTS/RT-00021 Keywords FTS, SIP, GSM-R, NSS, railways ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Voice-Over-IP Security – State-Of-The-Art, Risks, and Concepts
    Voice-over-IP Security – State-of-the-art, risks, and concepts Prof. Dr. -Ing. Evren Eren University of Applied Sciences Dortmund, Emil-Figge-Str. 42 44227 Dortmund, Germany and Dr. -Ing. Kai-Oliver Detken DECOIT GmbH, Fahrenheitstraße 9 28359 Bremen, Germany ABSTRACT • Campus VoIP: Campus VoIP uses an IP PBX (Private Branch eXchange), which is most common, or IP- These days most companies and organizations with a distributed enabled PBX. IP phones and/or softphones are structure Voice-over-IP (VoIP) is a useful technology. connected to the IP PBX. Calls initiated from these However, most of them do not sufficiently reflect upon security phones are routed through a gateway to the PSTN. issues or merely know about the risks. Therefore, networks, Thus, this topology is not prone to attacks since the systems and applications are at risk. The rapid growth of the VoIP network does not extend to the Internet or any VoIP market and effortless adoption to enterprise IT- other non-trusted network. Potential attacks must infrastructures implicate an increasing need for long-term originate from within the intranet. sustainable security concepts and solutions. This paper • IP Centrex/Hosted IP: This type requires the addresses the issues described by involvement of a VoIP service provider hosting the IP • analyzing security risks and possible attacks and their PBX and providing VoIP services from this network. implications on the overall security, The enterprise only needs IP phones, no other VoIP • assessing risks, customer premises equipment is necessary. In this case • presenting security mechanisms and standards, and – as with Campus VoIP – internal attacks exist; • presenting security concepts and recommendations.
    [Show full text]
  • RFC Editor Genband Response
    Network Working Group M. Handley Request for Comments: 2543 ACIRI Category: Standards Track H. Schulzrinne Columbia U. E. Schooler Cal Tech J. Rosenberg Bell Labs March 1999 SIP: Session Initiation Protocol Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. IESG Note The IESG intends to charter, in the near future, one or more working groups to produce standards for "name lookup", where such names would include electronic mail addresses and telephone numbers, and the result of such a lookup would be a list of attributes and characteristics of the user or terminal associated with the name. Groups which are in need of a "name lookup" protocol should follow the development of these new working groups rather than using SIP for this function. In addition it is anticipated that SIP will migrate towards using such protocols, and SIP implementors are advised to monitor these efforts. Abstract The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, modifying and terminating sessions with one or more participants. These sessions include Internet multimedia conferences, Internet telephone calls and multimedia distribution. Members in a session can communicate via multicast or via a mesh of unicast relations, or a combination of these. Handley, et al. Standards Track [Page 1] RFC 2543 SIP: Session Initiation Protocol March 1999 SIP invitations used to create sessions carry session descriptions which allow participants to agree on a set of compatible media types.
    [Show full text]
  • UNIVERSIT`A DEGLI STUDI DI MILANO a Middleware-Independent and Secure Peer-To-Peer SIP Architecture (MISE-P2PSIP)
    UNIVERSITA` DEGLI STUDI DI MILANO FACOLTA DI SCIENZE MATEMATICHE, FISICHE E NATURALI DIPARTIMENTO DI TECNOLOGIE DELL'INFORMAZIONE DOTTORATO DI RICERCA IN INFORMATICA (INF/01 INFORMATICA) SCUOLA DI DOTTORATO IN INFORMATICA, XXIII CICLO A Middleware-Independent and SEcure Peer-to-Peer SIP architecture (MISE-P2PSIP) TESI DI DOTTORATO DI RICERCA DI: HOUNGUE YENUKUNME PELAGIE ELYSE Matr. R07911 RELATORE Prof. Ernesto Damiani Universit`adegli Studi di Milano, Italy CORRELATORE Prof. Roch Glitho Concordia University, Canada DIRETTORE DELLA SCUOLA DI DOTTORATO Prof. Ernesto Damiani Anno Accademico 2010 − 2011 To my parents who have supported me all the way since the beginning of my studies. Abstract A Middleware-Independent and SEcure Peer-to-Peer SIP architec- ture (MISE-P2PSIP) The Session Initiation Protocol (SIP) is the de facto standard for multimedia multiparty sessions signaling in Next Generation Networks (NGN). It is at the basis of a wide range of IP multimedia services. SIP specification and current usage relies on centralized servers. However, research has recently started on the integration of Peer-to-Peer (P2P) principles into SIP for harnessing the benefits of decentralization. The contribution of this thesis is fourfold. Firstly, this thesis contributes to this research by proposing a novel architecture for P2P SIP. Our architecture is an overlay composed of a set of self-organized proxies and distributed registrars. Unlike other architectures proposed so far, our proposal does not require an extension to SIP messages and is P2P middleware- independent. This eases implementation, interoperability with legacy, and ensures portability. Secondly, the thesis discusses the routing issues related to such environment. Indeed, introducing proxies in a P2P SIP overlay raises two important issues namely the proxy topology building and proxy-level routing.
    [Show full text]
  • HT812/HT814 Analog Telephone Adaptors Administration Guide
    Grandstream Networks, Inc. HT812/HT814 Analog Telephone Adaptors Administration Guide COPYRIGHT ©2021 Grandstream Networks, Inc. http://www.grandstream.com All rights reserved. Information in this document is subject to change without notice. Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted. The latest electronic version of this user manual is available for download here: http://www.grandstream.com/support Grandstream is a registered trademark and Grandstream logo is trademark of Grandstream Networks, Inc. in the United States, Europe and other countries. CAUTION Changes or modifications to this product not expressly approved by Grandstream, or operation of this product in any way other than as detailed by this User Manual, could void your manufacturer warranty. WARNING Please do not use a different power adaptor with your devices as it may cause damage to the products and void the manufacturer warranty. P a g e | 1 HT812/HT814 Administration Guide Version 1.0.29.8 GNU GPL INFORMATION The firmware for the HT812/HT814 contains third-party software licensed under the GNU General Public License (GPL). Grandstream uses software under the specific terms of the GPL. Please see the GNU General Public License (GPL) for the exact terms and conditions of the license. Grandstream GNU GPL related source code can be downloaded from Grandstream web site from: http://www.grandstream.com/support/faq/gnu-general-public-license/gnu-gpl-information-download P a g e | 2 HT812/HT814 Administration Guide Version 1.0.29.8 Table of Content DOCUMENT PURPOSE ................................................................................................
    [Show full text]