+ All Categories
Home > Technology > Session intiation protocol tk

Session intiation protocol tk

Date post: 23-Jun-2015
Category:
Upload: chaitanya-krushna-t
View: 412 times
Download: 1 times
Share this document with a friend
Description:
A newbie view point of SIP way back in 2009.
Popular Tags:
66
Session Initiation Protocol: An Overview Chaitanya T K, DataCom
Transcript
Page 1: Session intiation protocol tk

Session Initiation Protocol: An Overview

Chaitanya T K,DataCom

Page 2: Session intiation protocol tk

Only those who dare to fall greatly can achieve

greatly

Robert Kennedy

Page 3: Session intiation protocol tk

Agenda: Telephony and VOIP basics Need for SIP? Welcome to SIP World Basic Operation and message formats Layering in SIP Types of proxies Detailed Handshakes Dialogs and routing Handling QOS Issues with SIP

Page 4: Session intiation protocol tk

Telephony and VOIP basics

Page 5: Session intiation protocol tk

Intro to VOIP:

Page 6: Session intiation protocol tk

Circuit Vs. Packet Switching:

Advantages of circuit switching: ---Fixed delays, because of the dedicated circuit-- Guaranteed continuous service, also because of the dedicated circuit

Disadvantages of circuit switching -- idle circuits are not used-- Difficult to support variable data rates and is not efficient for burst traffic

Page 7: Session intiation protocol tk

Advantages of Packet Switching

-- can provide variable data rates-- better for "bursty" traffic

Disadvantages of Packet Switching

-- Packets arriving in wrong order-- Variable delays

Page 8: Session intiation protocol tk
Page 9: Session intiation protocol tk
Page 10: Session intiation protocol tk

Welcome to the SIP world

Page 11: Session intiation protocol tk

Need for SIP?: What is a session? - Data Exchange between an association of participants

These data exchange is complicated since:

• Users can move• User can use Multiple names• Users can change the media A protocol that monitors and controls all these actions need to developed.

Page 12: Session intiation protocol tk
Page 13: Session intiation protocol tk
Page 14: Session intiation protocol tk
Page 15: Session intiation protocol tk

Functionalities provided by SIP:

User location: determination of the end system to be used for communication;

User availability: determination of the willingness of the called party to engage in communications;

User capabilities: determination of the media and media parameters to be used;

Session setup: "ringing", establishment of session parameters at both called and calling party;

Session management: including transfer and termination of sessions, modifying session parameters, and invoking services.

Page 16: Session intiation protocol tk
Page 17: Session intiation protocol tk
Page 18: Session intiation protocol tk
Page 19: Session intiation protocol tk

Key SIP Proxy Roles: Security: With admission control policy,SIP proxy enforces who may call whom,and eventually reports usage

Services: proxy servers can implement a variety of services: missed calls,forwarding, screening, etc.

Routing: Finding the right recipient of a call (gateway, voicemail, SIP-phone, foreign domain, etc.)

Page 20: Session intiation protocol tk
Page 21: Session intiation protocol tk

Transaction:

Page 22: Session intiation protocol tk

Dialogs:

Page 23: Session intiation protocol tk

Session:

Page 24: Session intiation protocol tk

Basic Steps in Operation of SIP:

Page 25: Session intiation protocol tk

Registration:

Page 26: Session intiation protocol tk

Registration request format:

Page 27: Session intiation protocol tk
Page 28: Session intiation protocol tk
Page 29: Session intiation protocol tk
Page 30: Session intiation protocol tk

INVITE Message Format:

Page 31: Session intiation protocol tk
Page 32: Session intiation protocol tk
Page 33: Session intiation protocol tk
Page 34: Session intiation protocol tk
Page 35: Session intiation protocol tk
Page 36: Session intiation protocol tk

Stateful versus Stateless Proxy Stateless mode:

– Usage: good for heavy-load scenarios -- works well for example if they act as application-layer load distributors.

– Behavior: proxies just receive messages, perform routing logic, send messages out and forget anything they knew

- Memory consumption is constant (which is key for some scenarios – transaction context takes up to 7k of memory!)

Page 37: Session intiation protocol tk

Stateful mode: Usage: good for implementing some services (e.g.,“forward on no reply”)

Behavior: proxies maintain state during entire transaction; they remember outgoing requests as well as incoming requests that generated them until transaction is over; they do not keep state during the whole call

Used for services such as accounting (for aggregating requests with responses and filtering retransmissions out), forking (for picking the ‘best’ answer), forwarding on some event (state helps to postpone decision making till an event such as ‘line busy’ occurs), etc.

Page 38: Session intiation protocol tk
Page 39: Session intiation protocol tk
Page 40: Session intiation protocol tk

Methods and Responses:

Page 41: Session intiation protocol tk

SIP Methods:

Page 42: Session intiation protocol tk
Page 43: Session intiation protocol tk
Page 44: Session intiation protocol tk
Page 45: Session intiation protocol tk

Dialogs and Routing-INVITE:

Page 46: Session intiation protocol tk

Dialogs and Routing-180:

Page 47: Session intiation protocol tk

Dialogs and Routing-200:

Page 48: Session intiation protocol tk

Dialogs and Routing-ACK:

Page 49: Session intiation protocol tk

Dialogs and Routing-BYE:

Page 50: Session intiation protocol tk

Dialogs and Routing-200:

Page 51: Session intiation protocol tk

Layers in SIP:

Page 52: Session intiation protocol tk

Layers in SIP: The structure of the SIP protocol, as outlined

in chapter 5 of RFC 3261: "The lowest layer is the transport layer. It defines how a client sends requests and receives responses and how a server receives requests and sends responses over the network. All SIP elements contain a transport layer.

The second layer is the transaction layer. A transaction is a request sent by a client transaction (using the transport layer) to a server transaction, along with all responses to that request sent from the server transaction back to the client. Any task that a user agent client (UAC) accomplishes takes place using a series of transactions. Stateless proxies do not contain a transaction layer.

The layer above the transaction layer is called the transaction user (TU). Each of the SIP entities, except the stateless proxy, is a transaction user."

Page 53: Session intiation protocol tk

Summary of Call setup Flow

Page 54: Session intiation protocol tk
Page 55: Session intiation protocol tk
Page 56: Session intiation protocol tk
Page 57: Session intiation protocol tk
Page 58: Session intiation protocol tk
Page 59: Session intiation protocol tk

Issues with SIP

Page 60: Session intiation protocol tk

Authentication of signaling data using

HTTP digest authentication

TLS usage (over TCP)

Usage of IPSec (SIP VPN Scenario)

Use SecureRTP for Media

Use S/MIME to enable mechanisms like

public key distribution,

authentication, integrity and

confidentiality of SIP signaling data

Security:

Page 61: Session intiation protocol tk
Page 62: Session intiation protocol tk

NAT with SIP:

Page 63: Session intiation protocol tk
Page 64: Session intiation protocol tk

SIP Vs. H.323

Page 65: Session intiation protocol tk

Judge a man by his questions rather than

his answers

Voltaire

Page 66: Session intiation protocol tk

Thank You -


Recommended