SIP is a signaling protocol used to establish multimedia sessions over IP networks. It allows clients to discover each other and establish communication sessions for voice, video, or other multimedia applications. The document provides an introduction to key SIP concepts including logical entities, request/response messages, basic call flows, and the SDP protocol for negotiating media parameters. It also describes how Wireshark can be used as a development tool to analyze SIP signaling packets.
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
If you don't know what SIP is, what it is used for or why you should even care then this is the section for you. This presentation will go over the very basics of SIP and assumes no previous knowledge of SIP or really any other network experience either. Topics it will touch upon is:
- What SIP is all about
- SIP and sessions management
- Basic call flow
- Brief discussion of SIP messages
- SIP and audio
Short presentation that introduces the basic concepts of SIP.
Note, some of the slides requires animations and will therefore look strange when viewed without them (e.g., see slide 17). Email me if you want the full presentation and I'll send it to you...
Internet protocol (VoIP) is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP network.The conventional technique used for sending voice is PSTN (public switched telephone network) . As data traffic has higher speed than telephone traffic, so what we do most of the time we prefer to send voice over data networks. Voice over internet protocol (VoIP) is a method of telephone communication over a data network.
Getting started with SIP Express Media Server SIP app server and SBC - workshopstefansayer
How to configure a SEMS instance for offering common media services such as announcements, voicemail, audio conferencing and IVR menus, and how to use the powerful and flexible SBC application, the "Swiss Army Knife of call stateful SIP processing".
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
If you don't know what SIP is, what it is used for or why you should even care then this is the section for you. This presentation will go over the very basics of SIP and assumes no previous knowledge of SIP or really any other network experience either. Topics it will touch upon is:
- What SIP is all about
- SIP and sessions management
- Basic call flow
- Brief discussion of SIP messages
- SIP and audio
Short presentation that introduces the basic concepts of SIP.
Note, some of the slides requires animations and will therefore look strange when viewed without them (e.g., see slide 17). Email me if you want the full presentation and I'll send it to you...
Internet protocol (VoIP) is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP network.The conventional technique used for sending voice is PSTN (public switched telephone network) . As data traffic has higher speed than telephone traffic, so what we do most of the time we prefer to send voice over data networks. Voice over internet protocol (VoIP) is a method of telephone communication over a data network.
Getting started with SIP Express Media Server SIP app server and SBC - workshopstefansayer
How to configure a SEMS instance for offering common media services such as announcements, voicemail, audio conferencing and IVR menus, and how to use the powerful and flexible SBC application, the "Swiss Army Knife of call stateful SIP processing".
LinuxCon North America: SIPPing from the Open Source WellMatt Bynum
This presentation dives into where Session Initiation Protocol (SIP) and eXtensible Messaging and Presence Protocol (XMPP) are used on Linux platforms, and ultimately why SIP is the best thing to hit our communications infrastructure since the Central Office (CO). I'll discuss DNS SRV in bind to enable SIP calls via domain lookups of User Resource Identifiers (URI). I'll also go over Linux desktop and Android clients that can register to varios call control platforms.
CCIE Collaboration Bootcamp is designed to be a challenging five-day course for CCIE Collaboration candidates ready for CCIE Collaboration Lab Exam. This Bootcamp is designed for CCIE Collaboration candidates in the last months or weeks before their CCIE Collaboration Lab Exam. During the week students will tackle challenging full-day mock labs Monday through Thursday. Candidate will practice strategy, time management, learn test taking strategies and expose any weaknesses in order to resolve them before the lab exam. On the final day of the course
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. Outline
• Introduction
• SIP Signaling
• Request/Response
• SIP Logical Entities
• Basic Call Flow
• SIP Message Syntax Overview
• Start Line
• Message Header
• SIP Correlated Protocols
• SIP Signaling and VoIP analysis using a Wireshark
Packet Analyzer
2
3. Introduction
• Session Initiation Protocol (SIP)
• SIP enable Internet Endpoints (Clients) to discover
and establish a session between each other
A signaling protocol (application-layer control protocol)
For creating, modifying, and terminating sessions
Separate signaling and media streams
All kind of real-time multimedia types, such as voice, video
or text messages
3
4. SIP Signaling
• SIP Message
• SIP is a text-based protocol and uses the UTF-8 charset.
• A SIP signaling is either a request message from a client to a
server, or a response message from a server to a client.
• Request: A SIP message sent from a client to a server, for the purpose
of invoking a particular operation.
• Response: A SIP message sent from a server to a client, for indicating
the status of a request sent from the client to the server.
• SIP Addressing (URI)
• E-mail like
• user@host
• sip:Alice@taipei.com
4
Client Server
Request
Response
5. SIP Logical Entities
• User Agent (UA): An endpoint
– User Agent Client (UAC): sends requests, receives responses
– User Agent Server (UAS): receives requests, sends responses
• Proxy server: A network host that proxies requests and
responses,
– i.e., acts as a UAC and as a UAS.
• Redirect server: a UAS that redirects request to other
servers.
• Back-to-back User Agent: a UAS linked to a UAC
– Acts as a UAS and as a UAC linked by some application logic
5
UAC UAS
Request
Response
Response
Request
Proxy
Request
Response
Response
Request
B2BUA
6. Request Method
6
Name Message Capability
INVITE The user is begin invited to participate in a session.
ACK The client has received a final response to an INVITE.
OPTIONS The server is begin queried as to its capabilities.
BYE The user terminated the session.
CANCEL It cancels a pending request (not completed request).
REGISTER It conveys the user’s location information to a SIP server.
7. Request Method (cont.)
7
Name Message Capability
SUBSCRIBE installs a subscription for a resource
NOTIFY informs about changes in the state of the resource
MESSAGE delivers an Instant Message
INFO used to transport mid-session information
PUBLISH publication of presence information
UPDATE changes the media description (e.g. SDP) in an existing
session
REFER used for call transfer, call diversion, etc.
PRACK acknowledges a provisional response for an INVITE request
8. Response Code
8
Serial Number Status Code Message Capability
1xx Provisional
request received, continuing to process the request,
e.g. 100 Trying
2xx Success
the action was successfully received, understood,
and accepted, e.g. 200 OK
3xx Redirection
further action needs to be taken in order to
complete the request, e.g. 302 Moved Temporarily
4xx Client Error
the request contains bad syntax or cannot be
fulfilled at this server, e.g. 486 Busy Here
5xx Server Error
the server failed to fulfill an apparently valid request,
e.g. 501 Not Implemented
6xx Global Failure
the request cannot be fulfilled at any
server, e.g. 604 Does Not Exist Anywhere
15. Message Header
• General Header
– Be applied to both request and response messages
• Entity Header
– Define information about the message body
• Request Header
– Allow the client to pass additional information about the request
• Response Header
– Allow the server to pass additional information about the
response
message-header = ( general-header
| request-header
| response-header
| entity-header)
18. Request Message Example
• INVITE
18
INVITE sip:bob@biloxi.com SIP/2.0
Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hG4bK776asdhds
Max-Forwards: 70
To: Bob <sip:bob@biloxi.com>
From: Alice <sip:alice@atlanta.com>;tag=1928301774
Call-ID: a84b4c76e66710@pc33.atlanta.com
CSeq: 314159 INVITE
Contact: <sip:alice@pc33.atlanta.com>
Content-Type: application/sdp
Content-Length: 142
(Alice's SDP not shown)
Request-URI
19. Request Message Example (cont.)
• The attribute mechanism “a=“ is the primary means for extending SDP and
tailoring it to particular applications or media.
• An example SDP description is:
• v=0
• o=jdoe 2890844526 2890842807 IN IP4 10.47.16.5
• s=SDP Seminar
• i=A Seminar on the session description protocol
• u=http://www.example.com/seminars/sdp.pdf
• e=j.doe@example.com (Jane Doe)
• c=IN IP4 224.2.17.12/127
• t=2873397496 2873404696
• a=recvonly
• m=audio 49170 RTP/AVP 0
• m=video 51372 RTP/AVP 99
• a=rtpmap:99 h263-1998/90000
19
Session description
v= (protocol version)
o= (originator and session identifier)
s= (session name)
i=* (session information)
u=* (URI of description)
e=* (email address)
p=* (phone number)
c=* (connection information -- not required if included in all media)
b=* (zero or more bandwidth information lines)
One or more time descriptions ("t=" and "r=" lines; see below)
z=* (time zone adjustments)
k=* (encryption key)
a=* (zero or more session attribute lines)
Zero or more media descriptions
Time description
t= (time the session is active)
r=* (zero or more repeat times)
Media description, if present
m= (media name and transport address)
i=* (media title)
c=* (connection information -- optional if included at session level)
b=* (zero or more bandwidth information lines)
k=* (encryption key)
a=* (zero or more media attribute lines)
21. Response Message Example
• 200 OK
21
SIP/2.0 200 OK
Via: SIP/2.0/UDP TWCompany.com:5060;branch=z9hG4bK8542.1
Via: SIP/2.0/UDP 140.113.102.103:5060;branch=z9hG4bK45a35h76
To: Alice <sip:alice.t@TWCompany.com>;tag=24019385
From: Bob <sip:bob.t@EUCompany.com>;tag=312345
Call-ID: 105637921@100.101.102.103
CSeq: 1 INVITE
Contact: sip:alice@140.201.202.203
Content-Type: application/sdp
Content-Length: 173
v=0
o= Alice 2452772446 2452772446 IN IP4 200.201.202.203
s=SIP Call
c=IN IP4 200.201.202.203
t=0 0
m=audio 56321 RTP/AVP 0
a=rtpmap:0 PCMU/8000
22. SIP Correlated Protocols
• Media information
– SDP (Session Description Protocol) is responsible
for setting the media attribute.
For example, setting the session port (port) and encoding
(codec)
RTP (Real-time Transport Protocol)is the voice in
a call or the video in a video call.
SRTP(Secure RTP) Since RTP can be intercepted
and decoded easily by any network capture. SRTP
uses AES as encryption to protect the voice
22
23. Session Description Protocol (SDP)
• SDP is a session description protocol for
multimedia sessions
• SDP is used to describe the set of media streams,
codecs, and other media related parameters
supported by either party.
• All SIP implementations MUST support SDP,
although they can support other bodies
• Used by other protocols than SIP: RTSP, SAP, etc.
• SDP was initially developed to support multicast
sessions in the Internet. Gradually tailored for SIP
purposes.
23
24. SDP Format
• Each field in the SDP message falls into one of the
following categories:
• Session name
• Time the session is active
• Media in the session and information required to
receive the media
• Information about bandwidth
• Contact info for the responsible person
• Fields in SDP messages have the format <field
code>=<value>. The field code is always a single
letter.
24
25. SDP Format (mandatory fields)
25
Field Meaning Format
v= protocol
version
v=0
o= session
owner and
identifier
o=<username> <session id> <version> <network type> <address type> <address>
In our example message above, the field was: o=root 1821 1821 IN IP4 10.10.1.99 ("IN" stands for Internet, "IP4" means IP
version 4 address)
s= session
name
s=<session name>
In our example, this was just: s=session
t= time the
session is
active
t=<start time> <stop time>
Even though this is a mandatory field in SDP, it is not very meaningful for SIP — it is not easy to predict the duration of a call.
Usually, both values are the same. In our example, we have just "t=0 0". The times are decimal Network Time Protocol values (in
seconds since the year 1900). In applications other than SIP, the SDP message can contain several "t= " lines, specifying
additional periods of time when the session will be active.
m= media type,
format, and
transport
address
m=<media> <port> <transport> <format list>
In our example message, this is:
m=audio 11424 RTP/AVP 0 8 101
The <media> is either "audio" or "video" (if the call contained both audio and video, there would be two "m=" lines). The <port>
should always be even (the even port is used by RTP and the next odd port by RTCP).
<transport> is usually "RTP/AVP", denoting the RTP protocol with the profile for "Audio and Video Conferences with Minimal
Control" (seeRFC3551).
Under the AVP, the code 0 denotes G.711 uLaw, 8 stands for G.711 ALaw, 3 denotes the GSM codec, and for example the
G.729 codec is denoted by 18. These codes appear in the <format list> part, and their order denotes the codec preferences of the
given user agent. In our example, G.711 uLaw (code 0) is the most preferred codec and G.711 ALaw is the second most
preferred. The codes not specified in the AVP can be introduced on a dynamic basis which is the case of the code 101 in our
example message.
26. SDP Format (optional fields)
26
Field Meaning Format
c= connection
information
c=<network type> <address type> <connection address>
In our example message, the field is as follows:
c=IN IP4 10.10.1.99
This field is "semi-optional". It must appear either at the session level (like in our example) where it is valid for the entire session,
or it must be included as a part of the "m=" field (after the <format list> part).
i= session
information
i=<textual description>
The session information may appear at the session level or within the "m=" field (like the "c=" field above).
k= encryption
key
k=<method>:<encryption key> or k=<method>
This parameter may appear at the session level or within the "m=" field.
a= session
attributes
a=<attribute> or a=<attribute><value>
The SDP message may contain zero or several session attributes. There's quite a number of possible attributes and we will look at
them below. Like the other optional fields in this table, "a=" may appear either at the session level or within the "m=" field. The
session-level option is the usual one as is the case in our example message.
Attribute Format and Description
rtpmap a=rtpmap:<payload type> <encoding name>/<clock rate> [/<encoding parameters>]
This attribute is called "rtpmap" because it defines a mapping from RTP payload codes (which are used in the <format list> in the "m="
field) to a codec name, clock rate, and other encoding parameters. The "rtpmap" field must be used for dynamic payload types (i.e.
types that are not predefined in the AVP profile) but it is quite common to use it even for the types that are already defined in the AVP
profile. In our example message, one of the "rtpmap" attributes is "a=rtpmap:0 PCMU/8000"
sendrecv a=sendrecv
This attribute means that we are going to both send and receive media. This is the option you will see with SIP, the other options
("sendonly", "recvonly", "inactive", "broadcast") would be highly unusual for a phone call.
ptime a=ptime:<packet time>
This parameter describes the length of time (in milliseconds) carried in one RTP packed.
fmtp a=fmtp:<format> <format specific parameters>
This option allows to define parameters that are specific for a given format code. SDP does not need to understand the parameters, it
only transports them.