SlideShare ist ein Scribd-Unternehmen logo
1 von 43
CMPE 208 FALL 2008 PROJECT

Chinmay Padhye
Amit More
Abhishek Sharma
Nihar Dandekar




SIP: SESSION INITIATION PROTOCOL
INTRODUCTION
    Developed originally as MULTIPARTY MULTIMEDIA

    SESSION CONTROL IN 1999 -- RFC 2543 (SIPv1)
    Latest revision RFC 3261 thru 3265 in June 2002 (SIPv2)


    A powerful alternative to H.323 protocol


    Is used for:

        Initiating SESSIONS of multimedia over the Internet
    

         transport session description from caller to callees
    

        Change of parameters in mid-session
    

        Terminate the session
    
INTRODUCTION
    LINEAGE :

        OSI Model – Layer 6 (Session Layer)
    

        TCP/IP Model – Layer 5 (Application Layer)
    

    Protocols supported:

        RSVP
    

        RTP
    

        RTCP
    

        RTSP
    

        SAP
    

        SDP
    
INTRODUCTION
    Applications:

        IP PBX
    

        IP TELEPHONEY
    

        INSTANT MESSEGING
    

        INTERNET CONFERENCING
    

    Features:

        Uses the client – server model
    

        Both the client and server can be on the same platform
    

        Uses the concept of intelligent endpoint
    
DISTRIBUTED FUNCTIONALITY
    De-centralization permits more functionality within each component.


    Changes made to specific components have a minor impact on the rest

    of the system. It is possible to connect one SIP phone to another with an
    Ethernet cable & make calls between the sets without the aid of any
    other server modules.
    The other system components become useful when the network

    requires more than two phones.
SIP - ENTITIES
SIP uses the following main Entities:
       USER AGENT CLIENT
   

       USER AGENT SERVER
   

       PROXY SERVER
   

       REDIRECT SERVER
   

       REGISTRAR / LOCATION SERVER
   
ENTITIES – UAC , UAS & REGISTRAR
ENTITIES – PROXY & REDIRECT SERVERS
SIP - SYNTAX
SIP - METHODS
    INVITE initiate call


    ACK confirm final response


    BYE terminate (and transfer) call


    CANCEL cancel searches and “ringing”


    OPTIONS features support by other side


    REGISTER register with location service


    INFO mid-call information (ISUP)


    PRACK provisional acknowledgement


    SUBSCRIBE subscribe to event


    NOTIFY notify subscribers


    REFER ask recipient to issue SIP request (call transfer)

SIP – REQUEST & RESPONSES

 In text format
    Look very similar to HTTP/1.1


    Requests and responses are similar except for first line


    Requests and responses can contain in there message

    bodies
        ASCII
    

        HTML
    

        SESSION DESCRIPTION
    
SIP RESPONSES
AUTHENTICATION & ENCRYPTION
    SIP supports a variety of approaches:

        End to end encryption
    

        Hop by hop encryption
    

    End to end encryption implemented using proxy servers that

    form a tunnel between peers after authentication
        Responds to INVITEs with 407 Proxy-Authentication Required
    
TEST BED
    User Agent Client (UAC)

         - Xlite
    

         - 3CX
    

         - SJphone
    


 User Agent Server
        - 3CX
         - Hamachi
    


    Packet analyzer
        - Wireshark
TEST CASES
    Soft-phone registration

    Simple call setup

        Call accepted
    
        Call ignored
    
        Soft-phone unregistered
    

    Call forwarding

        To voice mail
    
        To extension
    

    Call forking

        2 way parallel call forking
    
        3 way parallel call forking
    

    Secure call connection via HAMACHI server

SOFT-PHONE REGISTRATION
SOFT-PHONE REGISTRATION
SIMPLE CALL SETUP
SIMPLE CALL SETUP – CALL ACCEPTED
SIMPLE CALL SETUP – CALL ACCEPTED
SIMPLE CALL SETUP – CALL IGNORED
SIMPLE CALL SETUP – CALL IRNORED
SIMPLE CALL SETUP – PHONE UNREGISTERED
SIMPLE CALL SETUP – PHONE UNREGISTERED
CALL FORWARDING
CALL FORWARDING – TO VOICEMAIL
CALL FORWARDING – TO VOICEMAIL
CALL FORWARDING – TO VOICEMAIL
CALL FORWARDING – TO EXTENSION
CALL FORWARDING – TO EXTENSION
2 WAY CALL FORKING
2 WAY CALL FORKING
2 WAY CALL FORKING
2 WAY CALL FORKING
3 WAY CALL FORKING
3 WAY CALL FORKING
3 WAY CALL FORKING
SECURE CALL CONNECTION
SECURE CALL CONNECTION
SECURE CALL CONNECTION
CONCLUSION
    SIP is:



        Relatively easy to implement
    


        Gaining vendor and carrier acceptance
    


        Very flexible in service creation
    


        Extensible and scalable
    


        Appearing in products right now
    



    SIP provides its own reliability mechanism & is therefore



    independent of the packet layer and only requires an
    unreliable datagram service
REFRENCES
    [1] http://faq.programmerworld.net/voip/voip.htm

    [2] http://groups.google.com/group/SJSUee284/files

    [3] http://ezinearticles.com/?The-SIP-Advantage&id=270970

    [4] Internet Telephony based on SIP

         SMU - Dallas

        April 28, May 1, 2000

        Henry Sinnreich, MCI WorldCom

        Alan Johnston, MCI WorldCom

    [5]http://books.google.com/books?hl=en&lr=&id=VMP6gCBazzIC&oi=fnd&pg=PR17&dq=project+on+call+flow+using+SIP+protocol&ots=EtmKee0_M3&sig=bjqG

     [6] Evaluating SIP Proxy Server Performance

         Erich M. Nahum, John Tracey, and Charles P. Wright

         IBM T.J. Watson Research Center

         Hawthorne, NY, 10532

         fnahum,traceyj,cpwrightg@us.ibm.com

    [7] Session Initiation Protocol (SIP) and other Voice over IP (VoIP) protocols and applications Henrik Ingo1

    [8] http://www.3cx.com/phone-system/

    [9] http://en.wikipedia.org/wiki/Session_Initiation_Protocol

    [10] http://tools.ietf.org/html/rfc3261

    [11] http://www.counterpath.com/x-lite.html

    [12] http://www.counterpath.com/assets/files/191/X-Lite3.0_UserGuide.pdf

    [13] http://www.qgpop.net/2003fukuoka/papers/A7-3.pdf


    [14] http://en.wikipedia.org/wiki/Session_Initiation_Protocol


    [15] Carrier Grade VoIP - Daniel Collins – McGraw-Hill – NETWORKING eBOOK


    [16]http://www.radvision.com/NR/rdonlyres/0AFA30DF-DAD6-461D-943C-ED33F3E7ABD8/0/SIPServerTechnicalOverviewWhitepaper.pdf


    [17] http://en.wikipedia.org/wiki/Hamachi


    [18] http://www.cmpe.sjsu.edu/~fclin/

QUESTIONS ?

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 
Network Slides
Network SlidesNetwork Slides
Network Slides
iarthur
 

Was ist angesagt? (20)

Ppt mikrotik
Ppt mikrotikPpt mikrotik
Ppt mikrotik
 
UCCX vs PCCE vs UCCE
UCCX vs PCCE vs UCCEUCCX vs PCCE vs UCCE
UCCX vs PCCE vs UCCE
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
SDP (Session Description Protocol)
SDP (Session Description Protocol)SDP (Session Description Protocol)
SDP (Session Description Protocol)
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communications
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Audit Tools for Genesys Contact Centers
Audit Tools for Genesys Contact CentersAudit Tools for Genesys Contact Centers
Audit Tools for Genesys Contact Centers
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
 
Ad, dns, dhcp, file server
Ad, dns, dhcp, file serverAd, dns, dhcp, file server
Ad, dns, dhcp, file server
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Computer networks
Computer networksComputer networks
Computer networks
 
Genesys framework
Genesys frameworkGenesys framework
Genesys framework
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 

Andere mochten auch

Sip & its application
Sip & its applicationSip & its application
Sip & its application
Poulami Pal
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
Shelly
 

Andere mochten auch (11)

Sip & its application
Sip & its applicationSip & its application
Sip & its application
 
Interview Evaluation Sheet: Behavioral Question
Interview Evaluation Sheet: Behavioral QuestionInterview Evaluation Sheet: Behavioral Question
Interview Evaluation Sheet: Behavioral Question
 
Ims Services
Ims ServicesIms Services
Ims Services
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Marketing Case Interview: Cheat Sheet
Marketing Case Interview: Cheat SheetMarketing Case Interview: Cheat Sheet
Marketing Case Interview: Cheat Sheet
 
4 g technology
4 g technology4 g technology
4 g technology
 
Icmp
IcmpIcmp
Icmp
 
5. icmp
5. icmp5. icmp
5. icmp
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Simplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTESimplifying IMS - IMS, VoLTE, RCS and LTE
Simplifying IMS - IMS, VoLTE, RCS and LTE
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & Applications
 

Ähnlich wie Session Initiation Protocol - In depth analysis

1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
Mayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
Mayank Vora
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
William Giba
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113
a8us
 
Asterisk - Glen Bastes
Asterisk - Glen BastesAsterisk - Glen Bastes
Asterisk - Glen Bastes
soss
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
Warren Bent
 
2009 06 Chunghwa Telecom
2009 06 Chunghwa Telecom2009 06 Chunghwa Telecom
2009 06 Chunghwa Telecom
tunghunglin
 

Ähnlich wie Session Initiation Protocol - In depth analysis (20)

1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113Open mic mediaarchitecture_121113
Open mic mediaarchitecture_121113
 
Scanning The Intertubes For Voip
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For Voip
 
Everything You Need to Know About the IPsmarx SIP Trunking Solution
Everything You Need to Know About the IPsmarx SIP Trunking SolutionEverything You Need to Know About the IPsmarx SIP Trunking Solution
Everything You Need to Know About the IPsmarx SIP Trunking Solution
 
Asterisk - Glen Bastes
Asterisk - Glen BastesAsterisk - Glen Bastes
Asterisk - Glen Bastes
 
VOIP
VOIPVOIP
VOIP
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
TADS Developer Summit Apidaze Philippe Sultan
TADS Developer Summit Apidaze Philippe SultanTADS Developer Summit Apidaze Philippe Sultan
TADS Developer Summit Apidaze Philippe Sultan
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
The Real World - Plugging the Enterprise Into It (nodejs)
The Real World - Plugging  the Enterprise Into It (nodejs)The Real World - Plugging  the Enterprise Into It (nodejs)
The Real World - Plugging the Enterprise Into It (nodejs)
 
2009 06 Chunghwa Telecom
2009 06 Chunghwa Telecom2009 06 Chunghwa Telecom
2009 06 Chunghwa Telecom
 
6 understanding aruba rf issues
6 understanding aruba rf issues6 understanding aruba rf issues
6 understanding aruba rf issues
 
VOIP services
VOIP servicesVOIP services
VOIP services
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Session Initiation Protocol - In depth analysis

  • 1. CMPE 208 FALL 2008 PROJECT Chinmay Padhye Amit More Abhishek Sharma Nihar Dandekar SIP: SESSION INITIATION PROTOCOL
  • 2. INTRODUCTION Developed originally as MULTIPARTY MULTIMEDIA  SESSION CONTROL IN 1999 -- RFC 2543 (SIPv1) Latest revision RFC 3261 thru 3265 in June 2002 (SIPv2)  A powerful alternative to H.323 protocol  Is used for:  Initiating SESSIONS of multimedia over the Internet  transport session description from caller to callees  Change of parameters in mid-session  Terminate the session 
  • 3. INTRODUCTION LINEAGE :  OSI Model – Layer 6 (Session Layer)  TCP/IP Model – Layer 5 (Application Layer)  Protocols supported:  RSVP  RTP  RTCP  RTSP  SAP  SDP 
  • 4. INTRODUCTION Applications:  IP PBX  IP TELEPHONEY  INSTANT MESSEGING  INTERNET CONFERENCING  Features:  Uses the client – server model  Both the client and server can be on the same platform  Uses the concept of intelligent endpoint 
  • 5. DISTRIBUTED FUNCTIONALITY De-centralization permits more functionality within each component.  Changes made to specific components have a minor impact on the rest  of the system. It is possible to connect one SIP phone to another with an Ethernet cable & make calls between the sets without the aid of any other server modules. The other system components become useful when the network  requires more than two phones.
  • 6. SIP - ENTITIES SIP uses the following main Entities: USER AGENT CLIENT  USER AGENT SERVER  PROXY SERVER  REDIRECT SERVER  REGISTRAR / LOCATION SERVER 
  • 7. ENTITIES – UAC , UAS & REGISTRAR
  • 8. ENTITIES – PROXY & REDIRECT SERVERS
  • 10. SIP - METHODS INVITE initiate call  ACK confirm final response  BYE terminate (and transfer) call  CANCEL cancel searches and “ringing”  OPTIONS features support by other side  REGISTER register with location service  INFO mid-call information (ISUP)  PRACK provisional acknowledgement  SUBSCRIBE subscribe to event  NOTIFY notify subscribers  REFER ask recipient to issue SIP request (call transfer) 
  • 11. SIP – REQUEST & RESPONSES  In text format Look very similar to HTTP/1.1  Requests and responses are similar except for first line  Requests and responses can contain in there message  bodies ASCII  HTML  SESSION DESCRIPTION 
  • 13. AUTHENTICATION & ENCRYPTION SIP supports a variety of approaches:  End to end encryption  Hop by hop encryption  End to end encryption implemented using proxy servers that  form a tunnel between peers after authentication Responds to INVITEs with 407 Proxy-Authentication Required 
  • 14. TEST BED User Agent Client (UAC)  - Xlite  - 3CX  - SJphone   User Agent Server  - 3CX - Hamachi   Packet analyzer  - Wireshark
  • 15. TEST CASES Soft-phone registration  Simple call setup  Call accepted  Call ignored  Soft-phone unregistered  Call forwarding  To voice mail  To extension  Call forking  2 way parallel call forking  3 way parallel call forking  Secure call connection via HAMACHI server 
  • 19. SIMPLE CALL SETUP – CALL ACCEPTED
  • 20. SIMPLE CALL SETUP – CALL ACCEPTED
  • 21. SIMPLE CALL SETUP – CALL IGNORED
  • 22. SIMPLE CALL SETUP – CALL IRNORED
  • 23. SIMPLE CALL SETUP – PHONE UNREGISTERED
  • 24. SIMPLE CALL SETUP – PHONE UNREGISTERED
  • 26. CALL FORWARDING – TO VOICEMAIL
  • 27. CALL FORWARDING – TO VOICEMAIL
  • 28. CALL FORWARDING – TO VOICEMAIL
  • 29. CALL FORWARDING – TO EXTENSION
  • 30. CALL FORWARDING – TO EXTENSION
  • 31. 2 WAY CALL FORKING
  • 32. 2 WAY CALL FORKING
  • 33. 2 WAY CALL FORKING
  • 34. 2 WAY CALL FORKING
  • 35. 3 WAY CALL FORKING
  • 36. 3 WAY CALL FORKING
  • 37. 3 WAY CALL FORKING
  • 41. CONCLUSION SIP is:  Relatively easy to implement  Gaining vendor and carrier acceptance  Very flexible in service creation  Extensible and scalable  Appearing in products right now  SIP provides its own reliability mechanism & is therefore  independent of the packet layer and only requires an unreliable datagram service
  • 42. REFRENCES [1] http://faq.programmerworld.net/voip/voip.htm  [2] http://groups.google.com/group/SJSUee284/files  [3] http://ezinearticles.com/?The-SIP-Advantage&id=270970  [4] Internet Telephony based on SIP  SMU - Dallas  April 28, May 1, 2000  Henry Sinnreich, MCI WorldCom  Alan Johnston, MCI WorldCom  [5]http://books.google.com/books?hl=en&lr=&id=VMP6gCBazzIC&oi=fnd&pg=PR17&dq=project+on+call+flow+using+SIP+protocol&ots=EtmKee0_M3&sig=bjqG  [6] Evaluating SIP Proxy Server Performance  Erich M. Nahum, John Tracey, and Charles P. Wright  IBM T.J. Watson Research Center  Hawthorne, NY, 10532  fnahum,traceyj,cpwrightg@us.ibm.com  [7] Session Initiation Protocol (SIP) and other Voice over IP (VoIP) protocols and applications Henrik Ingo1  [8] http://www.3cx.com/phone-system/  [9] http://en.wikipedia.org/wiki/Session_Initiation_Protocol  [10] http://tools.ietf.org/html/rfc3261  [11] http://www.counterpath.com/x-lite.html  [12] http://www.counterpath.com/assets/files/191/X-Lite3.0_UserGuide.pdf  [13] http://www.qgpop.net/2003fukuoka/papers/A7-3.pdf   [14] http://en.wikipedia.org/wiki/Session_Initiation_Protocol   [15] Carrier Grade VoIP - Daniel Collins – McGraw-Hill – NETWORKING eBOOK   [16]http://www.radvision.com/NR/rdonlyres/0AFA30DF-DAD6-461D-943C-ED33F3E7ABD8/0/SIPServerTechnicalOverviewWhitepaper.pdf   [17] http://en.wikipedia.org/wiki/Hamachi   [18] http://www.cmpe.sjsu.edu/~fclin/ 