+ All Categories
Home > Documents > ipmobilityconcepts-studynotes-140317171527-phpapp01.pdf

ipmobilityconcepts-studynotes-140317171527-phpapp01.pdf

Date post: 15-Nov-2015
Category:
Upload: ranjithsimha
View: 4 times
Download: 0 times
Share this document with a friend
Popular Tags:
88
SIP (Session Initiation Protocol) Configuring - Monitoring - Troubleshooting Study Notes +W - Technology Skills For Women Series 1 http://SlideShare.net/OxfordCambridge 1 Men are allowed to read too, if they wish, as the language style and the document format are universal.
Transcript
  • SIP (Session Initiation Protocol)

    Configuring - Monitoring - Troubleshooting

    Study Notes

    +W - Technology Skills For Women Series1

    http://SlideShare.net/OxfordCambridge

    1 Men are allowed to read too, if they wish, as the language style and the document format are universal.

  • Study Notes http://SlideShare.net/OxfordCambridge

    2 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Table of Contents

    About +W - Technology Skills For Women series ................................................................................ 4

    Course Objectives .................................................................................................................................... 6

    References ............................................................................................................................................... 7

    A. Introducing SIP......................................................................................................................................... 8

    1. SIP and associated standards .............................................................................................................. 8

    Question ................................................................................................................................................ 12

    Question ................................................................................................................................................ 12

    B. 2. SIP components ................................................................................................................................. 12

    Question ................................................................................................................................................ 15

    Question ................................................................................................................................................ 16

    Summary ................................................................................................................................................ 16

    C. SIP Messages and Addressing ................................................................................................................ 18

    1. SIP messages ...................................................................................................................................... 18

    Question ................................................................................................................................................ 22

    Question ................................................................................................................................................ 22

    2. SIP addressing .................................................................................................................................... 23

    Question ................................................................................................................................................ 26

    Question ................................................................................................................................................ 26

    Summary ................................................................................................................................................ 26

    D. SIP Call Setup Models and Fault Tolerance ........................................................................................... 28

    1. Call setup models............................................................................................................................... 28

    Note ....................................................................................................................................................... 30

    Question ................................................................................................................................................ 34

    Question ................................................................................................................................................ 34

    2. Robust SIP design............................................................................................................................... 35

    Question ................................................................................................................................................ 36

    Question ................................................................................................................................................ 37

    3. Cisco implementation of SIP .............................................................................................................. 37

    Summary ................................................................................................................................................ 38

    E. Configuring and Monitoring SIP ............................................................................................................ 39

    1. Configuring SIP on a Cisco router ...................................................................................................... 39

    Question ................................................................................................................................................ 41

  • Study Notes http://SlideShare.net/OxfordCambridge

    3 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    2. Monitoring and troubleshooting SIP ................................................................................................. 42

    Question ................................................................................................................................................ 44

    Question ................................................................................................................................................ 45

    Question ................................................................................................................................................ 45

    Summary ................................................................................................................................................ 45

    F. Words and Definitions ........................................................................................................................... 47

    G. Answers to Quizzes ................................................................................................................................ 83

  • Study Notes http://SlideShare.net/OxfordCambridge

    4 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    About +W - Technology Skills For Women series

    Study Notes in the field of technology will be put together under this category for the following reasons:

    to encourage ladies, who wish to do so, to stand up and look over the fence into technology related

    topics;

    with apprehension or fear;

    and perhaps consider embracing a career move into this technological path;

    or simply as to broaden their general knowledge; after all ICT is in most aspects of everyday life;

    no matter the decision, their skills, professional strengths, and contribution can only be something

    positive for technical and technological fields.

  • Study Notes http://SlideShare.net/OxfordCambridge

    5 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    SIP: Session Initiation Protocol

    A. Introducing SIP

    B. SIP Messages and Addressing

    C. SIP Call Setup Models and Fault Tolerance

    D. Configuring and Monitoring SIP

  • Study Notes http://SlideShare.net/OxfordCambridge

    6 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Course Objectives

    Topic When you have completed this topic, you should be able to Checked?

    Yes/No

    Introducing SIP recognize the functionality of SIP, and identify the types of

    user agents and servers used by SIP.

    SIP Messages and Addressing distinguish between the types, use, and structure of SIP

    messages, identify SIP address formats, and recognize how SIP

    addresses are registered and resolved.

    SIP Call Setup Models and Fault

    Tolerance

    distinguish between SIP interworking models for call setup,

    recognize strategies for maintaining VoIP service, and identify

    SIP components supported by Cisco.

    Configuring and Monitoring SIP identify the configuration commands used to implement SIP

    call setup models, and the commands used to provide support

    for monitoring and troubleshooting SIP.

  • Study Notes http://SlideShare.net/OxfordCambridge

    7 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    References

    SIP - An Introduction (PDF) 2011-01-11? James Wright. Konnetic

    Integrating Voice and Data Networks 2000, Scott Keagy, Cisco Press, 1578701961

    Troubleshooting Cisco IP Telephony 2002, Paul Giralt, Addis Hallmark, Anne Smith, Cisco Press, 1587050757

    Voice over IP First-Step 2005, Kevin Wallace, Cisco Press, 1587201569

    http://en.wikipedia.org/wiki/Media_Gateway_Control_Protocol 3 September 2013

    http://en.wikipedia.org/wiki/Session_Initiation_Protocol 5 March 2014

  • Study Notes http://SlideShare.net/OxfordCambridge

    8 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    A. Introducing SIP

    After completing this topic, you should be able to recognize the functionality of SIP, and identify the

    types of user agents and servers used by SIP.

    1. SIP and associated standards

    2. SIP components

    Summary

    1. SIP and associated standards

    Session Initiation Protocol (SIP) provides a framework for establishing and maintaining Voice over IP (VoIP)

    calls.

    SIP is a signaling and control protocol for the establishment, maintenance, and termination of multimedia

    sessions with one or more participants. SIP multimedia sessions include Internet telephone calls, multimedia

    conferences, and multimedia distribution. Session communications may be based on multicast, unicast, or

    both.

    SIP operates on the principle of session invitations. Through invitations, SIP initiates sessions or invites

    participants into established sessions. Descriptions of these sessions are advertised by any one of several

    means, including the Session Announcement Protocol (SAP) defined in RFC 2974, which incorporates a

    session description according to the Session Description Protocol (SDP) defined in RFC 2327.

  • Study Notes http://SlideShare.net/OxfordCambridge

    9 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    SIP uses other Internet Engineering Task Force (IETF) protocols to define other aspects of VoIP and

    multimedia sessions; for example, URLs for addressing, Domain Name System (DNS) for service location, and

    Telephony Routing over IP (TRIP) for call routing.

    SIP supports personal mobility and other Intelligent Network (IN) telephony subscriber services through name

    mapping and redirection services. Personal mobility allows a potential participant in a session to be identified

    by a unique personal number or name.

    IN provides carriers with the ability to rapidly deploy new user services on platforms that are external to the

    switching fabric. Access to the external platforms is by way of an independent vendor and standard user

    interface. Calling-card services, toll-free number services, and local number portability are just three of these

    services.

    Multimedia sessions are established and terminated by these services:

    user location services

    user capabilities services

    user availability services

    call setup services

    call handling services

    user location services

    User location services are employed to locate an end system.

    user capabilities services

    User capabilities services are used to select the media type and parameters for multimedia sessions.

    user availability services

    User availability services are employed to determine the availability and desire for a party to participate in a

    session.

    call setup services

  • Study Notes http://SlideShare.net/OxfordCambridge

    10 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Call setup services are used to establish a session relationship between parties and to manage call progress.

    call handling services

    Call handling services are used to transfer and terminate calls.

    Although the IETF has made great progress in defining extensions that allow SIP to work with legacy voice

    networks, the primary motivation behind the protocol is to create an environment that supports next-

    generation communication models that use the Internet and Internet applications.

    SIP is described in IETF RFC 3261 (published in June 2002), which renders RFC 2543 (published in March 1999)

    obsolete.

    The Cisco SIP-enabled product portfolio encompasses all components of a SIP network infrastructure, from IP

    Phones and access devices to call control and public switched telephone network (PSTN) interworking.

    The first Cisco SIP products were deployed with live traffic several years ago.

    All of these Cisco SIP products are deployed in live networks spanning a variety of applications and

    continents. The first four products are

    Cisco IP Phones

    Cisco Analog Telephone Adaptor (Cisco ATA 186)

    Cisco packet voice gateways

    Cisco SIP Proxy Server

    Cisco IP Phones

    The Cisco IP Phone series, including the Cisco IP Phone 7970, Cisco IP Phone 7960 and Cisco IP Phone 7940,

    support SIP user agent (UA) functionality.

    These IP Phones deliver functionality such as inline power support and dual Ethernet ports, and deliver

    traditional desktop functionality such as call hold, transfer, conferencing, caller ID, call waiting, and a lighted

    message waiting indicator.

    Cisco Analog Telephone Adaptor (Cisco ATA 186)

  • Study Notes http://SlideShare.net/OxfordCambridge

    11 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    The Cisco ATA 186 supports SIP UA functionality. With two Foreign Exchange Station (FXS) ports and a single

    Ethernet port, the ATA 186 provides a low-cost means to connect analog phones to a SIP network.

    The ATA 186 also delivers traditional desktop functionality such as call hold, transfer, conferencing, caller ID,

    and lighted call-waiting and message waiting indicators.

    Cisco packet voice gateways

    The Cisco Series 1700 Modular Access Routers that are voice-capable, Cisco 2600 Series multiservice

    platforms, Cisco 3800 Series Integrated Services Routers, 3700 Series Integrated Services Routers, Cisco

    AS5000 Series Universal Gateways, and Cisco 7200 Series voice gateways all support SIP UA functionality.

    These products provide a means of connecting SIP networks to traditional time-division multiplexing (TDM)

    networks via T1, E1, digital service level 3 (DS3), channel associated signaling (CAS), PRI or BRI, R2 signaling,

    FXS, Foreign Exchange Office (FXO), or ear and mouth (E&M) interfaces.

    Cisco packet voice gateways are used to build the largest packet telephony networks in the world.

    Cisco SIP Proxy Server

    The Cisco SIP Proxy Server provides the functionality of a SIP proxy, SIP redirect, SIP registrar, and SIP location

    services server.

    The Cisco SIP Proxy Server provides the foundation for call routing within SIP networks; it can interwork with

    traditional SIP location services, such as DNS or telephone number mapping (E.164 number [ENUM]), with

    feature servers via a SIP redirect message, and with H.323 location services using standard location request

    (LRQ) messages.

    The Cisco SIP Proxy Server runs on either Solaris or Linux operating systems.

    The last three Cisco SIP products deployed in live networks spanning a variety of applications and continents

    are

    Cisco BTS 10200 Softswitch

    Cisco PGW 2200 PSTN Gateway

    Cisco PIX Security Appliance and Cisco Adaptive Security Appliance (ASA)

    Cisco BTS 10200 Softswitch

    The Cisco BTS 10200 Softswitch provides softswitch functionality to Class 4 and Class 5 networks, and provides

    SIP-to-Signaling System 7 (SS7) gateway functionality for American National Standards Institute (ANSI)

    standardized networks.

    The BTS 10200 Softswitch supports SIP UA functionality in conjunction with a Cisco packet voice media

    gateway, such as a Cisco AS5000 Series Universal Gateway or a Cisco MGX 8000 Series Voice Gateway.

    Cisco PGW 2200 PSTN Gateway

    The Cisco PGW 2200 PSTN Gateway provides softswitch functionality for Class 4 networks, as well as Internet

    offload and SIP-to-SS7 gateway functionality for international networks.

    The PGW 2200 PSTN Gateway supports ISDN User Part (ISUP) certification in over 130 countries.

    The PGW 2200 PSTN Gateway supports SIP UA functionality in conjunction with a Cisco packet voice media

    gateway such as an AS5000 Series Universal Gateway or MGX 8000 Series Voice Gateway.

    Cisco PIX Security Appliance and Cisco Adaptive Security Appliance (ASA)

  • Study Notes http://SlideShare.net/OxfordCambridge

    12 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    The Cisco PIX Security Appliance and the Cisco ASA are SIP-aware networking devices that provide firewall and

    Network Address Translation (NAT) functionality.

    Because these devices are SIP-aware, they are able to dynamically allow SIP signaling to traverse network and

    addressing boundaries without compromising overall network security.

    When functioning in this capacity, the Cisco PIX Security Appliance and the Cisco ASA are called application

    layer gateways (ALGs).

    Questioni

    Identify the Internet Engineering Task Force (IETF) protocol used by SIP for call routing.

    Options:

    1. Border Gateway Protocol (BGP)

    2. Open Shortest Path First (OSPF)

    3. Routing Information Protocol (RIP)

    4. Telephony Routing over IP (TRIP)

    Questionii

    Identify the SIP services that select the media type and parameters.

    Options:

    1. Call handling services

    2. Call setup services

    3. User availability services

    4. User capabilities services

    5. User location services

    B. 2. SIP components

    SIP is a peer-to-peer protocol. The peers in a session are called User Agents (UAs). SIP is modeled on the

    interworking of UAs and network servers.

    A UA consists of two functional components:

  • Study Notes http://SlideShare.net/OxfordCambridge

    13 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    user agent client (UAC)

    user agent server (UAS)

    user agent client (UAC)

    A UAC is a client application that initiates a SIP request.

    user agent server (UAS)

    A UAS is a server application that contacts the user when a SIP invitation is received and then returns a

    response on behalf of the user to the invitation originator.

    Typically, a SIP UA can function as a UAC or a UAS during a session, but not both in the same session.

    Whether the endpoint functions as a UAC or a UAS depends on the UA that initiated the request; the

    initiating UA uses a UAC and the terminating UA uses a UAS.

    From an architectural standpoint, the physical components of a SIP network are grouped into two categories:

    UAs and SIP servers.

    SIP UAs include these devices:

    IP telephone

    gateway

    IP telephone

    An IP telephone acts as a UAS or UAC on a session-by-session basis. Software telephones and Cisco SIP IP

    Phones initiate SIP requests and respond to requests.

    gateway

    A gateway acts as a UAS or UAC and provides call control support. Gateways provide many services, the most

    common being a translation function between SIP UAs and other terminal types. This function includes

    translation between transmission formats and between communications procedures. A gateway translates

  • Study Notes http://SlideShare.net/OxfordCambridge

    14 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    between audio and video signals and performs call setup and clearing on both the IP side and the switched

    circuit network (SCN) side.

    SIP servers include these types:

    proxy server

    redirect server

    registrar server

    location server

    proxy server

    A proxy server is an intermediate component that receives SIP requests from a client, then forwards the

    requests on behalf of the client to the next SIP server in the network. The next server can be another proxy

    server or a UAS. Proxy servers can provide functions such as authentication, authorization, network access

    control, routing, reliable request transmissions, and security.

    redirect server

    A redirect server provides a UA with information about the next server that the UA should contact. The server

    can be another network server or a UA. The UA redirects the invitation to the server identified by the redirect

    server.

    registrar server

    A registrar server makes requests from UACs for registration of their current location. Registrar servers are

    often located near or even colocated with other network servers, most often a location server.

    location server

    A location server is an abstraction of a service providing address resolution services to SIP proxy or redirect

    servers. A location server embodies mechanisms to resolve addresses. These mechanisms can include a

    database of registrations or access to commonly used resolution tools such as Finger protocol, Referral Whois

    (RWhois), Lightweight Directory Access Protocol (LDAP), or operating system-dependent mechanisms. A

    registrar server can be modeled as one subcomponent of a location server; the registrar server is partly

    responsible for populating a database associated with the location server.

    Except for the voice register mode request, communication between SIP components and a location server is

    not standardized.

    Leaders in the communications industry are constantly developing new products and services that rely on SIP,

    and they are offering attractive new communications services to their customers.

  • Study Notes http://SlideShare.net/OxfordCambridge

    15 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Microsoft added, in the past, support for SIP clients in core product offerings - a step that proliferates SIP

    clients on personal computers worldwide. SIP is gaining momentum in every market.

    Cisco has be enabling the advance of new communications services with a complete SIP-enabled portfolio,

    including proxy servers, packet voice gateways, call control and signalling, IP Phones, and firewalls. Cisco

    solutions support a variety of call control and standard protocols, including H.323, Media Gateway Control

    Protocol (MGCP), and SIP, which can coexist in the same customer network.

    Questioniii

    Identify which are SIP server types.

    Options:

    1. Dynamic Host Configuration Protocol (DHCP)

    2. Gateway

    3. Location

    4. Proxy

    5. Redirect

    6. Registrar

  • Study Notes http://SlideShare.net/OxfordCambridge

    16 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Questioniv

    Which SIP server is often collocated with the location server?

    Options:

    1. Gateway

    2. Proxy

    3. Redirect

    4. Registrar

    Summary

    SIP is a signaling and control protocol for the establishment, maintenance, and termination of multimedia

    sessions with one or more participants. Such multimedia sessions are established and terminated by five

    services: user location, user capabilities, user availability, call setup, and call handling. The Cisco SIP-enabled

    product portfolio comprises all components of a SIP network infrastructure, from IP Phones and access

    devices to call control and PSTN interworking.

    SIP is modelled on the interworking of UAs and network servers. A UA consists of two functional components:

    the UAC and the UAS. From an architectural viewpoint, the physical components of a SIP network are

    grouped into two categories: UAs, including IP telephones and gateways, and SIP servers, which include

    proxy, redirect, registrar, and location servers.

  • Study Notes http://SlideShare.net/OxfordCambridge

    17 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

  • Study Notes http://SlideShare.net/OxfordCambridge

    18 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    C. SIP Messages and Addressing

    After completing this topic, you should be able to distinguish between the types, use, and structure

    of SIP messages, identify SIP address formats, and recognize how SIP addresses are registered and

    resolved.

    1. SIP messages

    2. SIP addressing

    Summary

    1. SIP messages

    Communication between SIP components uses a request and response message model.

    INVITE sip:[email protected] SIP/2.0

    Via: SIP/2.0/UDP

  • Study Notes http://SlideShare.net/OxfordCambridge

    19 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    pc33.atlanta.com;branch=z9hG4bk776asdhds

    Max-Forwards: 70

    To: Bob

    From: Alice;tag=1928301774

    Call-ID: [email protected]

    CSeq: 314159 INVITE

    Contac:

    Content-Type: application/sdp

    Content-Length: 142

    SIP communication involves two messages:

    request from a client to a server

    response from a server

    request from a client to a server

    A request from a client to a server consists of a request line, header lines, and a message body.

    response from a server

    A response from a server to a client consists of a status line, header lines, and a message body.

    All SIP messages are text-based and modeled on RFC 822, Standard for the Format of ARPA Internet Text

    Messages, and RFC 2068, Hypertext Transfer Protocol - HTTP/1.1.

    SIP defines four types of headers: a general header, an entity header, a request header, and a response

    header. The first two types of headers appear on both message types. The latter two types of headers are

    specific to request and response, respectively.

  • Study Notes http://SlideShare.net/OxfordCambridge

    20 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    INVITE sip:[email protected] SIP/2.0

    Via: SIP/2.0/UDP

    pc33.atlanta.com;branch=z9hG4bk776asdhds

    Max-Forwards: 70

    To: Bob

    From: Alice;tag=1928301774

    Call-ID: [email protected]

    CSeq: 314159 INVITE

    Contac:

    Content-Type: application/sdp

    Content-Length: 142

    In the request line, SIP uses a message to indicate the action to be taken by the responding component

    (usually a server).

    These six request messages indicate the action that the responding component should take:

    INVITE

    acknowledgment (ACK)

    BYE

    CANCEL

    OPTIONS

    REGISTER

    INVITE

  • Study Notes http://SlideShare.net/OxfordCambridge

    21 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    The INVITE message is originated by a client to indicate that the server is invited to participate in a session. An

    invitation includes a description of the session parameters.

    acknowledgment (ACK)

    The ACK message is originated by a client to indicate that the client has received a response to its earlier

    invitation.

    BYE

    The BYE message is originated by a client or server to initiate call termination.

    CANCEL

    The CANCEL message is originated by a client or server to interrupt any request currently in progress. CANCEL

    is not used to terminate active sessions.

    OPTIONS

    The OPTIONS message is used by a client to solicit capabilities information from a server. This method is used

    to confirm cached information about a UA or to check the ability of a UA to message accept an incoming call.

    REGISTER

    The REGISTER message is used by a UA to provide information to a network server. Registrations have a finite

    life and must be renewed periodically. This prevents the use of stale information when a UA moves.

    SIP response messages are sent in response to a request and indicate the outcome of request interpretation

    and execution. Responses take one of three basic positions: success, failure, or provisional. A status code

    reflects the outcome of the request.

    There are six response messages to indicate the status of a request.

    1xx (informational)

    2xx (successful)

    3xx (redirection)

    4xx (client error)

    5xx (server error)

    6xx (global failure)

  • Study Notes http://SlideShare.net/OxfordCambridge

    22 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    1xx (informational)

    The 1xx (informational) status code is

    a provisional response indicating that the request is still being processed.

    2xx (successful)

    The 2xx (successful) status code indicates that the requested action is complete and successful.

    3xx (redirection)

    The 3xx (redirection) status code indicates that the requestor requires further action; for example, when a

    redirect server responds with "moved" to advise the client to redirect its invitation.

    4xx (client error)

    The 4xx (client error) status code is a fatal response indicating that the client request is flawed or impossible to

    complete.

    5xx (server error)

    The 5xx (server error) status code is a fatal response indicating that the request is valid but the server failed to

    complete it.

    6xx (global failure)

    The 6xx (global failure) status code is a fatal response indicating that the request cannot be fulfilled by any

    server.

    Questionv

    Identify the SIP message that is used to provide information to a network server.

    Options:

    1. ACK

    2. INVITE

    3. OPTIONS

    4. REGISTER

    Questionvi

    Identify the SIP response message that is provisional.

  • Study Notes http://SlideShare.net/OxfordCambridge

    23 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Options:

    1. 1xx (informational)

    2. 2xx (successful)

    3. 3xx (redirection)

    4. 4xx (client error)

    5. 5xx (server error)

    6. 6xx (global failure)

    2. SIP addressing

    To obtain the IP address of a SIP UAS or a network server, a UAC performs address resolution of a user

    identifier.

  • Study Notes http://SlideShare.net/OxfordCambridge

    24 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Fully qualified domain names

    sip:[email protected]

    E.164 addresses

    sip:[email protected]: user=phone

    Mixed addresses

    sip:14805551234: [email protected]

    sip:[email protected]

    An address in SIP is defined in the syntax for a URL with "sip:" or "sips:" (for secure SIP connections) as the

    URL type. SIP URLs are used in SIP messages to identify the originator, the current destination, the final

    recipient, and any contact party.

    When two UAs communicate directly with each other, the current destination and final recipient URLs are

    the same. However, the current destination and the final recipient are different if a proxy or redirect server is

    used.

    An address consists of an optional user ID, a host description, and optional parameters to qualify the address

    more precisely. The host description may be a domain name or an IP address. A password is associated with

    the user ID, and a port number is associated with the host description.

    This example shows instances of SIP addresses.

    In the example, "sip:[email protected]; user=phone", the "user=phone" parameter is required to

    indicate that the user part of the address is a telephone number. Without the "user=phone" parameter, the

    user ID is taken literally as a numeric string. The "14085559876" in the URL "sip:[email protected]" is

    an example of a numeric user ID. In the same example, the password "changem" is defined for the user.

  • Study Notes http://SlideShare.net/OxfordCambridge

    25 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    A SIP address is acquired in several ways: by interacting with a user, by caching information from an earlier

    session, or by interacting with a network server. For a network server to assist, it must recognize the

    endpoints in the network. This knowledge is abstracted to reside in a location server and is dynamically

    acquired by its registrar server.

    To contribute to this dynamic knowledge, an endpoint registers its user addresses with a registrar server. This

    example shows a voice REGISTER mode request to a registrar server.

    To resolve an address, a UA uses a variety of internal mechanisms such as a local host table, DNS lookup,

    Finger protocol, rwhois, or LDAP, or it leaves that responsibility to a network server. A network server uses

    any of the tools available to a UA or interacts through a nonstandard interface with a location server.

    This example shows a SIP proxy server resolving the address by using the services of a location server.

  • Study Notes http://SlideShare.net/OxfordCambridge

    26 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Questionvii

    Identify the ways in which a SIP UA can resolve an address.

    Options:

    1. Dynamic Host Configuration Protocol(DHCP)

    2. It lets the network server resolve it

    3. It relies on WINS

    4. It uses a local host table

    5. It uses rwhois

    Questionviii

    Identify the type of SIP address that is represented by:

    "sip:[email protected];user=phone".

    Options:

    1. An E.164 address

    2. A fully qualified domain name

    3. A mixed address

    Summary

    SIP employs a request/response messaging model for communication. All SIP messages are text-based and

    modeled on the HTTP syntax. SIP uses six response codes to indicate the status of a request: 1xx

    (informational), 2xx (successful), 3xx (redirection), 4xx (client error), 5xx (server error), and 6xx (global

    failure).

  • Study Notes http://SlideShare.net/OxfordCambridge

    27 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    SIP addresses use the format and structure of a URL. Network components such as location and registrar

    servers record addresses and carry out address resolution.

  • Study Notes http://SlideShare.net/OxfordCambridge

    28 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    D. SIP Call Setup Models and Fault Tolerance

    After completing this topic, you should be able to distinguish between SIP interworking models for

    call setup, recognize strategies for maintaining VoIP service, and identify SIP components supported

    by Cisco.

    1. Call setup models

    2. Robust SIP design

    3. Cisco implementation of SIP

    Summary

    1. Call setup models

    If a UAC recognizes the destination UAS, the client communicates directly with the server.

    In situations in which the client is unable to establish a direct relationship, the client solicits the assistance of

    a network server. There are three interworking models for call setup: direct, using a proxy server, and using a

    redirect server.

    When a UA recognizes the address of a terminating endpoint from cached information, or has the capacity to

    resolve it by some internal mechanism, the UAC may initiate direct (UAC-to-UAS) call setup procedures.

    Direct setup is the fastest and most efficient of the call setup procedures. However, direct setup has some

    disadvantages. It relies on cached information or internal mechanisms to resolve addresses, which can

    become outdated if the destination is mobile.

    In addition, if the UA must keep information on a large number of destinations, management of the data can

    become prohibitive. This makes the direct method nonscalable.

  • Study Notes http://SlideShare.net/OxfordCambridge

    29 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Direct call setup is a three-step process:

    step 1

    step 2

    step 3

    step 1

    In step 1, the originating UAC sends an invitation (INVITE) to the UAS of the recipient. The message includes an

    endpoint description of the UAC and SDP.

    step 2

    In step 2, if the UAS of the recipient determines that the call parameters are acceptable, it responds positively

    to the originator UAC.

    step 3

    In step 3, the originating UAC issues an ACK.

    After the final step of the direct call setup process, the UAC and UAS have all the information that is required

    to establish Real-Time Transport Protocol (RTP) sessions between them.

    The proxy server procedure is transparent to a UA. The proxy server intercepts and forwards an invitation to

    the destination UA on behalf of the originator.

  • Study Notes http://SlideShare.net/OxfordCambridge

    30 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    A proxy server responds to the issues of the direct method by centralizing control and management of call

    setup and providing a more dynamic and up-to-date address resolution capability. The benefit to the UA is

    that it does not need to learn the coordinates of the destination UA, yet can still communicate with the

    destination UA. The disadvantages of this method are that using a proxy server requires more messaging and

    creates a dependency on the proxy server. If the proxy server fails, the UA is incapable of establishing its own

    sessions.

    Note

    Although the proxy server acts on behalf of a UA for call setup, the UAs establish RTP sessions directly with each

    other.

    When a proxy server is used, call setup involves a seven-step procedure. These are the first four steps of the

    procedure.

    step 1

    step 2

    step 3

    step 4

  • Study Notes http://SlideShare.net/OxfordCambridge

    31 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    step 1

    In step 1, the originating UAC sends an invitation (INVITE) to the proxy server.

    step 2

    In step 2, the proxy server, if required, consults the location server to determine the path to the recipient and

    its IP address.

    step 3

    In step 3, the proxy server sends the INVITE to the UAS of the recipient.

    step 4

    In step 4, if the UAS of the recipient determines that the call parameters are acceptable, it responds positively

    to the proxy server.

    These are the last three steps of the call setup procedure for the proxy server method.

    step 5

    step 6

    step 7

    step 5

    In step 5, the proxy server responds to the originating UAC.

    step 6

    In step 6, the originating UAC issues an ACK.

    step 7

  • Study Notes http://SlideShare.net/OxfordCambridge

    32 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    In step 7, the proxy server forwards the ACK to the recipient UAS.

    After the final step of the proxy server call setup procedure, the UAC and UAS have all the information

    required to establish RTP sessions.

    A redirect server is programmed to discover a path to the destination. Instead of forwarding the INVITE to the

    destination, the redirect server reports back to a UA with the destination coordinates that the UA should try

    next.

    A redirect server offers many of the advantages of the proxy server. However, the number of messages

    involved in redirection is fewer than with the proxy server procedure. The UA has a heavier workload

    because it must initiate the subsequent invitation.

    When a redirect server is used, call setup involves a seven-step procedure. These are the first four steps of

    this process.

    step 1

    step 2

    step 3

    step 4

    step 1

    In step 1, the originating UAC sends an invitation (INVITE) to the redirect server.

    step 2

  • Study Notes http://SlideShare.net/OxfordCambridge

    33 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    In step 2, the redirect server, if required, consults the location server to determine the path to the recipient

    and its IP address.

    step 3

    In step 3, the redirect server returns a "moved" response to the originating UAC with the IP address obtained

    from the location server.

    step 4

    In step 4, the originating UAC acknowledges the redirection.

    These are the last three steps of the call setup procedure for the redirect server method.

    step 5

    step 6

    step 7

    step 5

    In step 5, the originating UAC sends an INVITE to the remote UAS.

    step 6

    In step 6, if the UAS of the recipient determines that the call parameters are acceptable, it responds positively

    to the UAC.

    step 7

    In step 7, the originating UAC issues an ACK.

    After the final step of the redirect server call setup procedure, the UAC and UAS have all the information that

    is required to establish RTP sessions between them.

  • Study Notes http://SlideShare.net/OxfordCambridge

    34 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Questionix

    Identify the disadvantage of using the direct call setup method.

    Options:

    1. It has to learn the coordinates of the destination UA

    2. It needs the assistance of a network server

    3. It relies on cached information that may be out of date

    4. It uses more bandwidth

    Questionx

    Which of these describes call setup using a proxy server?

    Options:

    1. If the proxy server fails, the UA cannot establish its own sessions

    2. If the proxy server fails, the UA uses RTP to establish its sessions

    3. The proxy server sends fewer redirection messages than a redirect server

    4. The UAs establish RTP sessions through the proxy server

  • Study Notes http://SlideShare.net/OxfordCambridge

    35 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    2. Robust SIP design

    Maintaining high availability of a SIP environment requires a design that accommodates the failure of a

    network server. There are two strategies for maintaining VoIP service in such situations.

    In a SIP environment, the failure of a network server cripples UAs that are dependent on that server. In SIP,

    the network servers are the proxy server, the redirect server, and the location server.

    The most obvious way to preserve access to the critical components is to implement multiple instances of

    access.

    For replication of a proxy or redirect server to be effective, a UA must have the ability to locate an active

    server dynamically. You can achieve this using either of these methods:

    method 1

    method 2

  • Study Notes http://SlideShare.net/OxfordCambridge

    36 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    method 1

    In method 1, you must preconfigure a UA with the address of at least two of the servers. If access to its first

    choice fails, it shifts to the second.

    method 2

    In method 2, if all servers are configured with the same name, you must configure a UA to look up the name

    using DNS. The DNS query returns the addresses of all the servers matching the name, and the UA proceeds

    down the list until it finds one that works.

    In this example, SIP servers have been replicated to ensure survival of the SIP environment in the event of the

    failure of a network server.

    Questionxi

    Identify the SIP components that need to be replicated in order to provide fault tolerance.

    Options:

    1. Gateway server

    2. Location server

    3. Proxy server

    4. Redirect server

    5. Registrar server

  • Study Notes http://SlideShare.net/OxfordCambridge

    37 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Questionxii

    Identify the method that can be used to replicate a proxy server.

    Options:

    1. Configuring a redirect server to act as a proxy server

    2. Configuring two location servers on the network

    3. Configuring two replication servers on the network

    4. Enabling the UA to dynamically locate an active server

    3. Cisco implementation of SIP

    Cisco implements SIP by providing support for SIP components. Therefore, Cisco provides support for these

    three SIP components:

    SIP UAs

    network servers

    other support

    SIP UAs

    Cisco provides support for SIP UAs in Cisco IP Phone. Cisco implements SIP UA (gateway) support in four

    devices:

    Cisco voice-enabled routers (first available in Cisco IOS Release 12.1), Cisco PGW 2200 PSTN Gateways, Voice-

    enabled Cisco AS5xx0 universal access servers, and Cisco BTS 10200 Softswitch.

    network servers

  • Study Notes http://SlideShare.net/OxfordCambridge

    38 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Cisco implements SIP proxy and redirect server support in the Cisco SIP Proxy Server. The server is an

    application designed for a Red Hat Linux 7.3 or Solaris 8 operating environment.

    other support

    Other support refers to Cisco PIX Security Appliance and Cisco ASA monitoring the SIP handshaking to

    dynamically open conduits for the RTP sessions.

    Summary

    Although call setup between UAs is possible, a proxy or redirect server may be employed for scalability or to

    simplify UA configuration.

    Maintaining high availability of a SIP environment requires a design that accommodates the failure of a

    network server. Using multiple SIP proxy or redirect servers enhances survivability in such a situation.

    Cisco supports standalone and gateway clients. The Cisco SIP Proxy Server supports SIP proxy or redirect

    services.

  • Study Notes http://SlideShare.net/OxfordCambridge

    39 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    E. Configuring and Monitoring SIP

    After completing this topic, you should be able to identify the configuration commands used to

    implement SIP call setup models, and the commands used to provide support for monitoring and

    troubleshooting SIP.

    1. Configuring SIP on a Cisco router

    2. Monitoring and troubleshooting SIP

    Summary

    1. Configuring SIP on a Cisco router

    A SIPA SIP configuration consists of two parts: the SIP UA and the VoIP dial peers that select SIP as the session

    protocol.

    You need to use configuration commands to implement SIP call setup models.

  • Study Notes http://SlideShare.net/OxfordCambridge

    40 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    The SIP UA is one part of the SIP configuration. This example displays a sample SIP UA configuration.

    The UA is enabled with the sip-ua command. Subcommands are optional. This example shows how you can

    change the value of four retry counters. The configuration also specifies the name of a SIP proxy or redirect

    server.

    !

    sip-ua

    retry invite 2

    retry response 2

    retry bye 2

    retry cancel 2

    sip-server dns:server

    !

    SIP is selected as the call control protocol from inside a dial peer. SIP is requested by the session protocol

    sipv2 dial-peer subcommand. This example displays two dial-peer variations.

  • Study Notes http://SlideShare.net/OxfordCambridge

    41 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    !

    dial-peer voice 444 voip

    destination-pattern 2339000

    session protocol sipv2

    session target ipv4:172.18.192.205

    !

    dial-peer voice 111 voip

    destination-pattern 111

    session protocol sipv2

    session target sip-server

    !

    In this example, both dial peers include the session protocol sipv2 subcommand, and SIP is used when the

    destination pattern matches either dial peer. The session target distinguishes one session from the other.

    dial-peer 444

    dial-peer 111

    dial-peer 444

    In dial-peer 444, the IP address of the server is provided as the session target. The address can be the address

    of a UA, proxy server, or redirect server.

    dial-peer 111

    In dial-peer 111, the session target is the sip-server parameter. When the sip-server parameter is the target,

    the IP address of the actual server is taken from the sip-server subcommand in the SIP UA configuration. This

    means that from global configuration mode, the network administrator has entered the sip-ua command and

    the sip-server dns:server subcommand. The address represents the location of a proxy server or redirect

    server. In this example, the name of the SIP server is "server".

    Questionxiii

    Identify the show command that displays SIP UA response and retry information.

    Options:

  • Study Notes http://SlideShare.net/OxfordCambridge

    42 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    1. show call active voice

    2. show sip-ua retry

    3. show sip-ua statistics

    4. show sip-ua status

    2. Monitoring and troubleshooting SIP

    You can use the show and debug commands to provide support for monitoring and troubleshooting SIP.

    There are six show commands that are valuable when examining the status of SIP components and

    troubleshooting:

    show call active voice [brief]

    show call history voice [last n | record | brief]

    show sip-ua retry

    show sip-ua statistics

    show sip-ua status

    show sip-ua timers

  • Study Notes http://SlideShare.net/OxfordCambridge

    43 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    show call active voice [brief]

    The show call active voice [brief] command displays the status, statistics, and parameters for all active voice

    calls.

    show call history voice [last n | record | brief]

    The show call history voice [last n | record | brief] command displays call records from the history buffer.

    show sip-ua retry

    The show sip-ua retry command displays the SIP protocol retry counts. High counts should be investigated.

    show sip-ua statistics

    The show sip-ua statistics command displays the SIP UA response, traffic, and retry statistics.

    show sip-ua status

    The show sip-ua status command displays the SIP UA listener status, which should be enabled.

    show sip-ua timers

    The show sip-ua timers command displays the current value of the SIP UA timers (shown in the figure).

    There are seven debug commands that are valuable when examining the status of SIP components and

    troubleshooting. Here are the first four commands:

    debug voip ccapi inout

    debug ccsip all

    debug ccsip calls

    debug ccsip errors

    debug voip ccapi inout

    The debug voip ccapi inout command shows every interaction with the call control application programming

    interface (API) on both the telephone interface and on the VoIP side. By monitoring the output, you can follow

    the progress of a call from the inbound interface or VoIP peer to the outbound side of the call. This debug

    command is very active, so you must use it sparingly in a live network.

    debug ccsip all

  • Study Notes http://SlideShare.net/OxfordCambridge

    44 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    The debug ccsip all command enables all ccsip-type debugging. This debug command is very active, so you

    must use it sparingly in a live network.

    debug ccsip calls

    The debug ccsip calls command displays all SIP call details as they are updated in the SIP call control block. You

    must use this debug command to monitor call records for suspicious clearing causes.

    debug ccsip errors

    The debug ccsip errors command traces all errors encountered by the SIP subsystem.

    The last three debug commands are displayed.

    debug ccsip events

    debug ccsip messages

    debug ccsip states

    debug ccsip events

    The debug ccsip events command traces events, such as call setups, connections, and disconnections. An

    events version of a debug command is often the best place to start, because detailed debugs provide a great

    deal of useful information.

    debug ccsip messages

    The debug ccsip messages command shows the headers of SIP messages that are exchanged between a client

    and a server.

    debug ccsip states

    The debug ccsip states command displays the SIP states and state changes for sessions within the SIP

    subsystem.

    Questionxiv

    Which debug command would you use to trace call setups, connections, and disconnections?

    Options:

    1. debug ccsip calls

    2. debug ccsip events

    3. debug ccsip messages

    4. debug ccsip states

    5. debug voip ccapi inout

  • Study Notes http://SlideShare.net/OxfordCambridge

    45 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Questionxv

    Which debug command must you use to monitor call records for suspicious clearing causes?

    Options:

    1. debug ccsip all

    2. debug ccsip calls

    3. debug ccsip errors

    4. debug ccsip states

    Questionxvi

    Identify the show command that displays the SIP UA listener status, which should be enabled.

    Options:

    1. show call active voice

    2. show sip-ua retry

    3. show sip-ua statistics

    4. show sip-ua status

    Summary

    A SIP configuration comprises two elements: the SIP UA and the VoIP dial peers that select SIP as the session

    protocol. You enable the SIP UA using the sip-ua command. SIP is selected as the call control protocol from

    inside a dial peer using the session protocol sipv2 dial-peer subcommand.

    You can use the six show and seven debug commands to provide support for monitoring and troubleshooting

    SIP.

  • Study Notes http://SlideShare.net/OxfordCambridge

    46 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

  • Study Notes http://SlideShare.net/OxfordCambridge

    47 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    F. Words and Definitions

    AAA

    Acronym for authentication, authorization, and accounting. Systems implemented to securely determine the identity and privileges of a user and track that user's activities.

    access class

    The class of service a customer chooses when subscribing to DS-3 based Switched MultiMegabit Data Services (SMDS). The access class is defined as 4, 10, 16, 25, or 34 Mbps. For users who subscribe to an access class lower than 34 Mbps, a 34 Mbps bandwidth is available for burst transmissions; However, the duration of user bursts is limited so that the average throughput does not exceed the specified access class. See also SMDS.

    access code

    A sequence of dialed digits that allows a user to gain access to a facility, service, feature, or function of a network or system.

    access coordination

    The design, ordering, installation, testing, and maintenance of local access services.

    access delay

    The time interval from the last digit of a dialed number until the call is delivered by the local exchange carrier (LEC) to the appropriate interexchange carrier (IXC). Also known as call setup time. See also IXC.

    access device

    The hardware component used in a signaling controller system, access server, or multiplexer.

    access digit

    On a PBX, an outside line is normally accessed by dialing an access digit, such as 9.

    access gateway

    A gateway that allows the IP PBX to communicate with the PSTN or traditional PBX systems. See also IP, PBX, and PSTN.

    access layer

    Part of ISO-OSI layered protocol model.

    access line

    A transmission line that provides access to a larger system or network.

    access link

    The local access connection between a customer's premises and a carrier's point of presence (POP), which is the carrier's central switching office or closest point of local termination. See also POP.

    access method

    The technique for moving data, voice, or video between storage and input/output devices. Also, the technique and/or program code used in local area networks (LANs) to grant selective access to individual stations.

    access node

    See AN.

    access port

    Connects a network device to an IP device. For example, a computer can be connected to an IP phone through an access port.

    access protocol

    A set of specific procedures that enable a user to obtain services from a telephone company or network.

    access server

    Communications processor that connects asynchronous devices to a LAN or WAN through network and terminal emulation software. Performs both synchronous and asynchronous routing of supported protocols. Sometimes called a network access server. Access servers for the Cisco signaling controller are the Cisco AS5200, Cisco AS5300, and Cisco AS5800.

    account code

  • Study Notes http://SlideShare.net/OxfordCambridge

    48 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    A numeric code that identifies the calling party for internal billing or accounting purposes. Account codes are often used by service companies such as accountants and lawyers to bill specific clients for telephone expenses. Also known as a project code or bill-back code.

    ACD

    Acronym for automatic call distributor. A device that handles a large number or incoming calls. An ACD performs four functions: first, it recognizes and answers incoming calls; second, it looks in a database to decide how to route the call; third, based on these instructions, it sends the call to an answering position based on a pre-determined, logical answering pattern. (Or, if all positions are busy, the ACD plays a recorded message and places the call in a queue until an answering position becomes available); finally, the ACD connects the call to an agent, once that agent has completed the previous call.

    ACL

    Acronym for access control list. A roster of users and groups of users, along with their access rights.

    ACP

    Acronym for automatic call processing. A system in which calls are processed entirely by computer.

    additional call offering

    An Integrated Services Digital Network (ISDN) feature that allows multiple calls to be placed simultaneously to the same telephone number. A serving switch is programmed with the number of lines on the receiving telephone equipment. The switch will offer an additional call if there is a line available to accept it. See also ISDN.

    address

    In a communications network, the identifying designation of an entity that is physically and/or logically distinct. Also, the destination of a message. Also, in software, any location that can be specifically referred to in a program storage location, terminal, peripheral device, cursor location or any other component.

    Ad-Hoc conference

    A Cisco CallManager feature that allows a conference controller to build a conference that has not been previously arranged. In an Ad-Hoc conference, the conference controller individually calls and adds each participant to the conference. Compare to Meet-Me Conference.

    Administrative Reporting Tool

    See ART.

    Administrative VLAN

    Used in non-Cisco switched networks in conjunction with Cisco IP Phones to indicate the virtual local area network (VLAN) of which the phone is a member. Assigns the phone to an auxiliary VLAN. See also Operational VLAN.

    ADPCM

    Acronym for adaptive differential pulse code modulation. A speech coding method that uses fewer bits than the traditional pulse code modulation (PCM).

    ADU

    Acronym for automatic dialing unit. A device that automatically generates a predetermined telephone number when a specific button is pressed.

    AEC

    Acronym for automatic echo cancellation.

    agent

    Individuals or companies that market the services of a carrier, but are not directly employed by the carrier.

    AIM

    Advanced Interface Module. The data compression AIM provides hardware-based compression and decompression of packet data transmitted and received on the serial network interfaces of the Cisco 2600 series router without occupying the Port Module Slot that might otherwise be used for additional customer network ports. Designed to plug directly into a header on the Cisco 2600 series router motherboard.

    a-law

  • Study Notes http://SlideShare.net/OxfordCambridge

    49 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    ITU-T companding standard used in the conversion between analog and digital signals in pulse code modulation (PCM) systems. In contrast to the North American mu-law, a-law provides a constant signal-to-distortion ratio over a broader dynamic range of analog input signals at the expense of a poorer signal-to-distortion ratio for low-level signals. See also companding and -law.

    ALB

    Acronym for analog loop back. A method of testing modems in which the telephone line is disconnected and the transmitted signal is looped back to the receiver.

    alerting

    The process a switch uses to inform customer premises equipment (CPE) that an incoming call is present and waiting for an answer. For analog lines, alerting consists of applying a ringing voltage; for hybrid telephones, alerting consists of sending signaling bits; and for digital telephones, cellular telephones, or personal communications service (PCS) handsets, it consists of sending a message to the CPE that alerts the user. Alerting of the end user is a function of the CPE (e.g., audible ring, flashing lamp, voice announcement). On some CPE, additional incoming calls for busy lines may be indicated via messages, lamps or call waiting tones. See also CPE and PCS.

    ambient noise

    The background noise that is present on a non-digital communications line at all times.

    AMIS

    Acronym for Audio Messaging Interchange Specification. A series of standards aimed at addressing the problem of how voice messaging systems produced by different vendors can network or inter-network. Before AMIS, systems from different vendors could not exchange voice messages. AMIS deals only with the interaction between two systems for the purpose of exchanging voice messages. It does not describe the user interface to a voice messaging system, specify how to implement AMIS in a particular system, or limit the features a vendor may implement. See also AMIS-A.

    AMIS-A

    Acronym for Audio Messaging Interchange Specification-Analog. See also AMIS.

    amplifier

    An electronic device used to increase the amplitude or power level of a signal. Amplifiers are used in telecommunications on analog transmission lines to offset the signal loss that occurs as the signal is propagated along the line.

    AN

    Acronym for access node. A broadband Integrated Services Digital Network (ISDN) remote switch that performs grooming, concentration, and switching functions.

    analog bridge

    A device for connecting multiple analog circuits to a common circuit.

    analog channel compression

    A technique for fitting more than one program into a single channel using analog processes.

    analog loop back

    See ALB.

    analog signal

    A continuous signal that is infinitely and continuously variable in amplitude and/or frequency.

    analog transmission

    The transmission of continuously variable (analog) signals. As a signal is transmitted along an analog network, the signal strength eventually weakens or attenuates. Amplifiers may be installed in the network to amplify the signal, but because there is no way to differentiate between an analog signal and noise, both are amplified. Therefore, noise tends to accumulate in an analog network.

    ANC

    Acronym for Answer, Charge.

    ANI

    Acronym for automatic number identification. A PSTN system that transmits the billing number of the calling party for accounting and billing purposes.

    ANM

  • Study Notes http://SlideShare.net/OxfordCambridge

    50 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Acronym for answer message. An off-hook signal sent in the reverse direction that indicates when the called party answers. Billing starts when the answer message is received.

    ANN

    Acronym for Answer, No Charge.

    ANSI

    Acronym for American National Standards Institute. A U.S. organization chartered to accredit standards developed by a wide variety of industry groups while avoiding improper influence from any one company or organization. ANSI does not develop standards, but reviews and implements those developed by other organizations. For example, ANSI accredits standards for telephony developed by the Alliance for Telecommunications Industry Standards (ATIS) under the auspices of the T1 Committee, and standards for cellular radio developed by the Electronics Industry Association (EIA) and the Telecommunications Industry Association (TIA). ANSI is a member of the International Organization for Standardization (ISO). See also ATIS, EIA, and ISO.

    answerback

    A signal sent by a data receiver to a data transmitter indicating that it is ready to receive data or to acknowledge the receipt of data.

    answering machine

    A CPE device that, in the absence of the called party, automatically answers incoming calls with a prerecorded message and records messages from callers.

    ANU

    Acronym for Answer, Unqualified.

    a-number

    A cellular term referring to the number of the calling party. The originating switch analyzes the a-number in order to route a call to the b-number, the number of the called party. The a-number can be analyzed by configuring dial plans created with the dial plan provisioning (DPP) utility. See also dial plan and b-number.

    AOS

    Acronym for alternative operator service. A non-telephone company operator service. Users of AOS include hotels and non-telco public telephones where a commission is paid to the establishment for allowing the AOS to bill for the call. Many AOS operations have billing agreements with local exchange companies (LECs) which will pass the billed charges back to the customer's hotel room or home telephone number.

    API

    Acronym for application programming interface. Software that an application program uses to request and carry out lower-level services.

    application

    A software program that performs a function directly for a user. Examples include the Cisco CallManager administrative reporting tool (ART) and Bulk Administration Tool (BAT), as well as Microsoft Word. A web browser is a network application.

    application sharing

    A form of data collaboration that allows a participant to select one or more of the applications resident on his/her PC and make it available to the other participants. All participants may then manipulate the application as if it were executing on their PCs.

    area code

    The first three digits of a 10-digit telephone number in the North American Numbering Plan. See also NANP.

    ARP

    Acronym for Address Resolution Protocol. Internet protocol used to map an IP address to a MAC address. Defined in RFC 826. Allows host computers and routers to determine the data link layer address corresponding to the IP address in a packet routed through the LAN. Although the packet is addressed to an IP address, the LAN hardware responds only to data link layer addresses. The host or router with the destination IP address replies with its own data link layer address in an ARP response, which the forwarding host or router will use to construct a data link layer frame. The result is stored in cache memory so subsequent packets addressed to the same destination can be routed without an explicit ARP process.

    ARPA

    Acronym for Advanced Research Projects Agency of the U.S. Department of Defense. ARPA funded research and experimentation with ARPANET, the predecessor to the Internet. See also TCP/IP.

  • Study Notes http://SlideShare.net/OxfordCambridge

    51 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    ARQ

    Acronym for automatic retransmission request (ARQ). A method of checking transmitted data on high speed data communications systems in which the sender encodes an error detection field based on the contents of the message. The receiver recalculates the check field and compares it with the received field. If the fields match, a positive acknowledgment ("ACK" or "PAK") is returned to the sender. If the fields do not match, a negative acknowledgment (NAK) is returned to the sender.

    ART

    An acronym for audible ringing tone. A signal sent back to the calling party to indicate the called number is ringing. Also, an acronym for administrative reporting tool. A web-based application for Cisco CallManager that generates reports on performance and service details. See also CDR and CMR.

    ARU

    Acronym for audio response unit. An output device that provides a spoken response to digital inquiries from a telephone or other device (For example, "Press 1 to hear this information again; Press 2 to hear more options.") Also known by the generic name audiotex.

    ASIC

    Acronym for application specific integrated circuit. Circuit designs used by manufacturers to consolidate many chips into a single package, reducing board size and power consumption.

    AST

    Acronym for automatic spanning tree. Function that supports the automatic resolution of spanning trees in source-route bridging networks, providing a single path for spanning explorer frames to traverse from a given node in the network to another. AST is based on the IEEE 802.1 standard. See also SRB.

    AT

    Acronym for Analog Access Trunk. Expressed as AT-2, AT-4, or AT-8 to correspond to 2-, 4-, and 8-port gateways.

    ATB

    Acronym for all trunks busy. A single tone repeated at a 120 impulse per minute (ipm) rate to indicate that all trunks in a routing group are in use.

    ATIS

    Acronym for Alliance for Telecommunications Industry Standards, a Washington D.C. trade group heavily involved in standards issues, including interconnection and interoperability issues.

    ATM

    Acronym for Asynchronous Transfer Mode. International standard for cell relay in which multiple service types (such as voice, video, or data) are conveyed in fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in hardware, thereby reducing transit delays. ATM is designed to take advantage of high-speed transmission media such as E3, SONET, and T3.

    attendant console

    A large, specialized telephone set used by the operator to answer incoming calls and send those calls to the proper extension.

    audio stream RTP packets

    Capable of conducting real-time voice data over connectionless networks such as TCP/IP. See also RTP.

    audio switch

    A remote controlled device for switching conference room audio circuits that are used to deliver compressed video transmission service. An audio switch can switch room audio connections to either a coder/decoder or a separate return required for multipoint conferences. See also codec.

    audiotex

    Generic term for interactive voice response equipment and services. See also ARU.

    authentication

    The process of determining the identity of a user attempting to access a system.

    authorization

    The process of granting a user access to a system.

    auto registration

  • Study Notes http://SlideShare.net/OxfordCambridge

    52 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    Process by which Cisco CallManager automatically detects and adds new IP telephony devices to its database, such as Cisco IP Phones and Cisco DPA 7630 devices. Auto registration assigns the next available directory number designated for the device type at the time that each new device is plugged into the network.

    automatic callback

    A feature of a telecommunications system or an IP telephony device that records, and can dial, the originating phone number of the last incoming call.

    availability

    The degree to which a system or resource is operable and not in a state of congestion or failure at any given point in time.

    AVD

    Acronym for alternate voice data. A single transmission facility used for either voice or data.

    AVVID

    See Cisco AVVID.

    back end

    Functions and procedures of a database server, such as a node or software application, designed to manipulate data on a network. See also client, FRF.11, and server.

    back haul

    A method of call routing in which the call is taken beyond its destination and then back to that destination. Usually used to attain cheaper rates.

    backup

    The logical or physical provisioning of facilities to speed the process of restart and recovery following network failures. Also, redundant facilities, including duplicated transaction files, duplicated processors, storage devices, terminal, telecommunications hardware or switches.

    band

    The range of frequencies between two defined limits. Also, one of the six specific wide-area telephone service (WATS) geographic service areas.

    bandwidth

    Difference between the highest and lowest frequencies available for network signals.

    Amount of data that can be transmitted in a fixed amount of time, or the rated throughput capacity of a given network medium or protocol.

    baseband

    A network technology in which only one carrier frequency is used (for example, Ethernet).

    bastion server

    A server that is accessible from a public network (such as the Internet) without protection from a firewall.

    BAT

    Acronym for bulk administration tool. A web-based application for Cisco CallManager that enables bulk system modifications, including adding and deleting phones, modifying phones, and adding users and mailboxes.

    BGP

    Acronym for Border Gateway Protocol. The routing protocol used between separate administrative domains (for example, between an enterprise corporation and its ISP).

    BH

    Acronym for busy hour. The peak 60-minute period during a business day when the largest volume of traffic is handled by a network.

    B-ISDN

    Acronym for Broadband Integrated Services Digital Network. A network that employs switching techniques independent of transmission speeds, and that allows a network to expand its capacity without major equipment overhauls. B-lSDNs support gigabit speed circuits in the public network and high speed switching of all traffic types in public and private networks. B-lSDNs also provide bandwidth-on-demand capabilities. Contrast with N-ISDN. See also BRI, ISDN, and PRI.

  • Study Notes http://SlideShare.net/OxfordCambridge

    53 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    blind transfer

    Passing a call without notifying the recipient. Also known as unsupervised transfer or cold transfer.

    blocked call

    An attempted call that cannot be connected. The two most common reasons for blocked calls are all lines or trunks to the central office are in use, or all paths through a private branch exchange (PBX) or switch are in use. Also, a service offered by 900 providers that permits users to request that their local carrier blocks all 900 calls in order to avoid incurring charges.

    blocking

    The inability to establish a new call because of restrictions or inaccessibility of facilities in the system being called.

    b-number

    A cellular term for the number of the called party. The originating switch analyzes the a-number, the number of the calling party, in order to route the call to the b-number. See also a-number.

    BOOTP

    Acronym for Bootstrap Protocol. A TCP/IP protocol that enables a network device to discover certain startup information, such as its IP address.

    BPDU

    Acronym for Bridge Protocol Data Unit. Spanning-Tree Protocol hello packet that is sent out at configurable intervals to exchange information among bridges in the network. See also PDU.

    break

    To interrupt the sending of a message and take control of the circuit at the receiving end. Also, an interruption of a transmission or process.

    BRF

    Acronym for Bridge Relay Function. As defined by the IEEE, an internal bridge function on a Token Ring switch that is responsible for forwarding frames between port groupings with the same logical ring number. Within a BRF, source-route bridging or source-route transparent bridging can be used to forward frames. See also CRF.

    BRI

    Acronym for Basic Rate Interface. ISDN interface composed of two B-channels and one D-channel for circuit-switched communication of voice, video, and data. Compare with PRI. See also B-ISDN, ISDN, and N-ISDN.

    bridge

    A device that passes information between two network segments. Operates at layer 2 of the Open Systems Interconnection (OSI) reference model (the data link layer). See OSI. Also, a device used to match circuits to each other to ensure minimum transmission impairment. Bridging is normally required on multipoint data channels where several local loops or channels are interconnected.

    Bridged Telnet

    Offers Cisco Service Engineers (CSEs) transparent firewall access to the Cisco CallManager server on a customer site for diagnostic and troubleshooting purposes. It enables a telnet client inside the Cisco Systems firewall to connect to a telnet process behind a customer firewall.

    broadband

    A type of communications channel capable of carrying a large portion of the electromagnetic spectrum. A broadband channel can accommodate the following media: audio, digital, and television. Also, a transmission facility having a bandwidth greater than 20 kHz capable of high speed data transmission. Also, an analog transmission technique used with data and video transmissions that provides multiple user channels through frequency-division multiplexing (FDM). See FDM.

    broadcast

    Data packet that is sent to all nodes on a network. Broadcasts are identified by a broadcast address. Compare with multicast and unicast. See also broadcast address.

    broadcast address

    Special address reserved for sending a message to all stations. Generally, a broadcast address is a MAC destination address of all ones. Compare with multicast address and unicast address. See also broadcast.

    broadcast packet

  • Study Notes http://SlideShare.net/OxfordCambridge

    54 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    A data packet transmitted simultaneously to all network devices.

    broadcast storm

    An undesirable network event in which many broadcasts are sent at once. Broadcast storms use substantial network bandwidth and may cause network time-outs.

    browser

    GUI-based hypertext client application, such as Internet Explorer, Mosaic, and Netscape Navigator, used to access hypertext documents and other services located on innumerable remote servers throughout the World Wide Web and Internet. See also GUI.

    BSI

    Acronym for Basic Rate Interface. ISDN interface composed of two B-channels and one D-channel for circuit-switched communication of voice, video, and data.

    Bulk Administration Tool

    See BAT.

    busy

    A call condition in which transmission facilities are already in use. A line is considered busy when the caller goes off-hook.

    busy tone

    A single tone that is repeated at a 60 impulse per minute (ipm) rate to indicate that a call's terminating location is already in use.

    CAC

    Acronym for call admission control. In Cisco CallManager, CAC maintains a desired level of voice quality over a WAN link by regulating bandwidth consumption used by calls over the link. Limits the number of simultaneous active calls over the link. See also locations and gatekeeper.

    call admission control

    See CAC.

    call control

    Telephone industry term used to describe the setting up, monitoring, and tearing down of phone calls.

    call detail recording

    See CDR.

    call forward all calls

    Configurable feature that re-routes all incoming calls destined for one telephony device to another phone or device.

    call forward busy

    Configurable feature that re-routes incoming calls to an alternate line when the first line is in use.

    call forward no answer

    Configurable feature that re-routes incoming calls from one phone to another phone when the first phone is not answered after a certain number of rings.

    call forwarding

    Configurable feature that sends incoming calls routed to a particular directory number to another number.

    Call Management Record

    See CMR.

    call park

    Configurable feature that allows the user to deposit a stable call at a specified directory number, then go to another phone and dial the park number to retrieve the call. (Call park differs from a "hold" feature by allowing the user to retrieve the call from any phone on the same system. A system administrator must configure a call park number, or range of numbers, for this feature to work).

    call pickup

    Configurable feature that allows a user to redirect an incoming call that routed to another destination in order to retrieve the call on the user's own phone or directory number. See also group call pickup.

  • Study Notes http://SlideShare.net/OxfordCambridge

    55 | P a g e S I P ( S e s s i o n I n i t i a t i o n P r o t o c o l )

    call processing

    See distributed call processing and centralized call processing.

    call waiting

    Feature of telephony systems that notifies a caller when another call is coming in during an active call.

    callback

    Callback allows remote clients to dial into a central site, and then have the central site immediately call back the remote site.

    caller ID

    A display, available to the called party before the party answers a telephone call, that identifies the originating telephone number and the subscriber's name associated with that number. See also CLID.

    Calling Line Identification

    See CLID.

    calling party transformation settings

    Allows the user to manipulate the appearance of the calling party's number for outgoing calls.

    calling search space

    Determines which partitions a calling device searches when attempting to complete a call.

    camp on

    A technique in which an incoming call is stored on hold until an attendant, trunk, trunk group, or station is available to accept it, at which time the call is completed.

    CAS

    Acronym for centralized attendant service. One group of switchboard operators answers all incoming calls for several telephone systems located throughout one city or region. Also, acronym for channel associated signaling. In-band signaling used to provide emergency signaling information along with a wireless 911 call to the Public Safety Answering Point (PSAP).

    CBQ

    Acronym for class-based queuing. A queuing algorithm used in routers to manage c


Recommended