SlideShare a Scribd company logo
1 of 37
TO
SIP By AnIrBAn
1
What is SIP ?
SIP Components .
Basic Call Flow Understanding.
SIP Functions Analysis.
Conclusion.
INDEX
2
VOIP is a technology that allows you to deliver voice and multimedia (videos,
pictures) content over the Internet.
Some advantages of VOIP include:
* Low cost
* Easier to Install, Configure, and Maintain
* No extra cables
* Flexibility
* Even older technology like Fax is supported
For a VOIP call, all that you need is a computer/laptop/mobile with internet
connectivity.
H.323, H.248,SDP, RTP and SIP is widely used for VOIP Technology.
VOIP TECHNOLOGY
3
 SIP is a signaling protocol used to create, modify, and terminate a multimedia
session over the Internet Protocol (IP Network) .
 SIP is an application layer protocol defined by IETF (Internet Engineering Task
Force) standard. It is defined in RFC 3261.
 SIP can be used for two-party (unicast) or multiparty (multicast) sessions.
 Other SIP applications include file transfer, instant messaging, video
conferencing, online games etc.
LETS TALK ABOUT SIP..
4
WHERE SIP STANDS ON ?
5
 February 1996- Initial Internet drafts were produced in the form of –
 Session Invitation Protocol (SIP) – M.Handley & E.Schooler
 Simple Conference Invitation Protocol (SCIP) – H.Schulzrinne
 At this stage, IP telephony didn't really exist.
 The first draft was known as "draft-ietf-mmusic-sip-00”. It included only one request
type, which was a call setup request.
 December 1996- A newer version “draft-ietf-mmusic-sip-01” was proposed as a
modification to SIP-0
 January 1999-The IETF published the draft called "draft-ietf-mmusic-sip-12". It
contained the six requests that SIP has today.
 March 1999- SIP published RFC 2543 as a standard.
It was modified further to generate the more modern version of RFC 3261 .
SHORT STORY OF SIP
6
SIP User Agent - It is the endpoint and one of the most important network elements
of a SIP network. An endpoint can initiate, modify, or terminate a session. User agents
are the most intelligent device or network element of a SIP network.
Simply SIP enabled device is called SIP User Agent.
User agents are logically divided into two parts:
 User Agent Client (UAC) : It generates requests and send those to servers.
 User Agent Server (UAS) : It gets requests, processes those requests and
generate responses.
Note: A single UA may function as both.
SIP COMPONENTS
7
 It is the network element that takes a request from a user agent and forwards it to
another user .
 Basically the role of a proxy server is much like a router.
 A proxy server sits in between two user agents .
 There can be a maximum of 70 proxy servers in between a source and a
destination.
PROXY SERVER
8
 There are two types of proxy servers:
 Stateless Proxy Server : It simply forwards the message received.
This type of server does not store any information of a call or a
transaction.
 Stateful Proxy Server : This type of proxy server keeps track
of every request and response received and can use it in future if
required.
Note: It has no media capabilities.
TYPES OF PROXY SERVER
9
The registrar server accepts registration requests from user agents. It helps users to
authenticate themselves within the network .It stores the URI and the location of a
database so that other SIP servers within the same domain may take help.
REGISTRAR SERVER
10
 The redirect server receives requests and looks up the intended recipient of the
request in the location database created by the registrar.
Note : Simply they finds alternative locations.
REDIRECT SERVER
11
 The location server provides information about a caller's possible locations to
the redirect and proxy servers.
LOCATION SERVER
12
BASIC CALL FLOW
13
 An INVITE request that is sent to a proxy server is responsible for initiating session.
 The proxy server sends a 100 Trying response immediately to the caller (Alice) to
stop the re-transmissions of the INVITE request.
 The proxy server searches the address of Bob in the location server . After getting the
address, it forwards the INVITE request further.
 Thereafter, 180 Ringing (Provisional responses) generated by Bob is returned back
to Alice.
 A 200 OK response is generated soon after Bob picks the phone up .
CALL FLOW
14
 Bob receives an ACK from the Alice, once it gets 200 OK
 At the same time, the session gets established and RTP packets
(conversations) start flowing from both ends .
 After the conversation, any participant (Alice or Bob) can send a BYE request
to terminate the session.
 BYE reaches directly from Alice to Bob bypassing the proxy server .
 Finally Bob sends a 200 OK response to confirm the BYE and the session is
terminated.
CALL FLOW
15
 SIP messages are of two types:
 Requests and Responses
SIP MESSAGING
16
SIP requests contain following methods:
REGISTER: Used by a UA to register to the registrar.
INVITE: Used to establish a media session between user agents.
ACK: ACK is used to acknowledge the final responses to an INVITE method .
CANCEL: Terminates a pending request.
BYE: Terminates an existing session.
OPTIONS: Query servers about their capabilities .
SIP REQUEST
17
A SIP response is a message generated by a user agent server (UAS) or SIP
server to reply a request generated by a client .
SIP has six responses.
Provisional (1xx): Request received and being processed.
Success (2xx): The action was successfully received, understood, and
accepted.
Redirection (3xx): The client should retry the request at another server.
Client Error (4xx): The request contains bad syntax or cannot be fulfilled
at the server.
Server Error (5xx): The server failed to fulfill an apparently valid request.
Global Failure (6xx): The request cannot be fulfilled at any server.
SIP RESPONSE
18
1xxInformational
 100 Trying
 180 Ringing
 181 Call is Being Forwarded
 182 Queued
 183 Session progress
2xx Success
 200 OK
4xxClient error
400 Bad Request
401 Unauthorized
403 Forbidden
404 Not Found
480 Temporary unavailable
486 Busy Here
487 Request Terminated
5xxServer failure
500 Server Internal Error
501 Not Implemented
503 Unavailable
6xxGlobal Failure
600 Busy Everywhere
603 Decline
604 Doesn’t Exist
3xx Redirection
 301 Moved Permanently
 302 Moved Temporarily
 380 Alternative server
SIP RESPONSE CODES
19
SUCCESSFUL SIP CALL FLOW
20
INVITE
21
SUCCESSFUL SIP CALL FLOW
22
100 TRYING
23
SUCCESSFUL SIP CALL FLOW
24
180 RINGING
25
SUCCESSFUL SIP CALL FLOW
26
200 OK
27
SUCCESSFUL SIP CALL FLOW
28
ACK
29
SUCCESSFUL SIP CALL FLOW
30
 I’M JOKING 
31
SUCCESSFUL SIP CALL FLOW
32
BYE
33
SUCCESSFUL SIP CALL FLOW
34
200 OK
35
AN UNSUCCESSFUL SIP CALL FLOW
36
THE END
37

More Related Content

What's hot

SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesMarius FAILLOT DEVARRE
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllersstefansayer
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communicationsRanjit Patel
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunkingorionnow
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedAmit Deshmukh
 
S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002Nam Nguyen
 
Aspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical ArchitectureAspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical ArchitectureVishad Garg
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
GVP8- Troubleshooting.pptx
GVP8- Troubleshooting.pptxGVP8- Troubleshooting.pptx
GVP8- Troubleshooting.pptxMiyuruChamath
 

What's hot (20)

SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communications
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002
 
SIP vs PRI
SIP vs PRISIP vs PRI
SIP vs PRI
 
Aspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical ArchitectureAspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical Architecture
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
SIP Tutorial/Workshop 1
SIP Tutorial/Workshop 1SIP Tutorial/Workshop 1
SIP Tutorial/Workshop 1
 
GVP8- Troubleshooting.pptx
GVP8- Troubleshooting.pptxGVP8- Troubleshooting.pptx
GVP8- Troubleshooting.pptx
 

Viewers also liked

SDP (Session Description Protocol)
SDP (Session Description Protocol)SDP (Session Description Protocol)
SDP (Session Description Protocol)Buşra Deniz, CSM
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...B&T Magazine
 
Microsoft Communications Plan
Microsoft Communications PlanMicrosoft Communications Plan
Microsoft Communications PlanCharros King
 
Shilpa_Ranganathan_-_Resume
Shilpa_Ranganathan_-_ResumeShilpa_Ranganathan_-_Resume
Shilpa_Ranganathan_-_ResumeShilpa R
 
FSB: TreeWalker - SECCON 2015 Online CTF
FSB: TreeWalker - SECCON 2015 Online CTFFSB: TreeWalker - SECCON 2015 Online CTF
FSB: TreeWalker - SECCON 2015 Online CTFYOKARO-MON
 
2016 Terry Chang_160429
2016 Terry Chang_1604292016 Terry Chang_160429
2016 Terry Chang_160429?? ?
 
Ian McClelland, Managing Director, Guardian News & Media
Ian McClelland, Managing Director, Guardian News & MediaIan McClelland, Managing Director, Guardian News & Media
Ian McClelland, Managing Director, Guardian News & MediaB&T Magazine
 
KAGİDER SEÇİN
KAGİDER SEÇİNKAGİDER SEÇİN
KAGİDER SEÇİNsanemoktar
 
Guia nxt pagina26 37
Guia nxt pagina26 37Guia nxt pagina26 37
Guia nxt pagina26 37hemaycortes
 
Envenomation stings
Envenomation stingsEnvenomation stings
Envenomation stingsSUDEEP
 

Viewers also liked (16)

SDP (Session Description Protocol)
SDP (Session Description Protocol)SDP (Session Description Protocol)
SDP (Session Description Protocol)
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...
Associate Professor Kai Riemer, Chair of Business Information Systems, Univer...
 
Microsoft Communications Plan
Microsoft Communications PlanMicrosoft Communications Plan
Microsoft Communications Plan
 
Shilpa_Ranganathan_-_Resume
Shilpa_Ranganathan_-_ResumeShilpa_Ranganathan_-_Resume
Shilpa_Ranganathan_-_Resume
 
Brazil
BrazilBrazil
Brazil
 
FSB: TreeWalker - SECCON 2015 Online CTF
FSB: TreeWalker - SECCON 2015 Online CTFFSB: TreeWalker - SECCON 2015 Online CTF
FSB: TreeWalker - SECCON 2015 Online CTF
 
2016 Terry Chang_160429
2016 Terry Chang_1604292016 Terry Chang_160429
2016 Terry Chang_160429
 
Ian McClelland, Managing Director, Guardian News & Media
Ian McClelland, Managing Director, Guardian News & MediaIan McClelland, Managing Director, Guardian News & Media
Ian McClelland, Managing Director, Guardian News & Media
 
Sarampion caso real diagrama forrester
Sarampion caso real diagrama forresterSarampion caso real diagrama forrester
Sarampion caso real diagrama forrester
 
Zoliswa_Twesha_CV2[1]
Zoliswa_Twesha_CV2[1]Zoliswa_Twesha_CV2[1]
Zoliswa_Twesha_CV2[1]
 
Tipos de evaluacion
Tipos de evaluacionTipos de evaluacion
Tipos de evaluacion
 
KAGİDER SEÇİN
KAGİDER SEÇİNKAGİDER SEÇİN
KAGİDER SEÇİN
 
Guia nxt pagina26 37
Guia nxt pagina26 37Guia nxt pagina26 37
Guia nxt pagina26 37
 
Envenomation stings
Envenomation stingsEnvenomation stings
Envenomation stings
 
Redes sociales rosmira florez
Redes sociales  rosmira florezRedes sociales  rosmira florez
Redes sociales rosmira florez
 

Similar to Sip

Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocolkshitijmehta23
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
session-initiation-protocol
session-initiation-protocolsession-initiation-protocol
session-initiation-protocolSailee Choudhary
 
Sip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaperSip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepapersirajsamad
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1Carl Ford
 
Sip & its application
Sip & its applicationSip & its application
Sip & its applicationPoulami Pal
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overviewFaisal Khan
 

Similar to Sip (20)

What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
Session initiation protocol
Session initiation protocolSession initiation protocol
Session initiation protocol
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Sip
SipSip
Sip
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Sip summary
Sip summarySip summary
Sip summary
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
session-initiation-protocol
session-initiation-protocolsession-initiation-protocol
session-initiation-protocol
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 
Sip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaperSip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaper
 
Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1
 
Sip & its application
Sip & its applicationSip & its application
Sip & its application
 
Scall
ScallScall
Scall
 
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overviewCCIE Collaboration Lecture Chapter 4.4 voice gateway   cucm sip overview
CCIE Collaboration Lecture Chapter 4.4 voice gateway cucm sip overview
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Sip

  • 2. What is SIP ? SIP Components . Basic Call Flow Understanding. SIP Functions Analysis. Conclusion. INDEX 2
  • 3. VOIP is a technology that allows you to deliver voice and multimedia (videos, pictures) content over the Internet. Some advantages of VOIP include: * Low cost * Easier to Install, Configure, and Maintain * No extra cables * Flexibility * Even older technology like Fax is supported For a VOIP call, all that you need is a computer/laptop/mobile with internet connectivity. H.323, H.248,SDP, RTP and SIP is widely used for VOIP Technology. VOIP TECHNOLOGY 3
  • 4.  SIP is a signaling protocol used to create, modify, and terminate a multimedia session over the Internet Protocol (IP Network) .  SIP is an application layer protocol defined by IETF (Internet Engineering Task Force) standard. It is defined in RFC 3261.  SIP can be used for two-party (unicast) or multiparty (multicast) sessions.  Other SIP applications include file transfer, instant messaging, video conferencing, online games etc. LETS TALK ABOUT SIP.. 4
  • 6.  February 1996- Initial Internet drafts were produced in the form of –  Session Invitation Protocol (SIP) – M.Handley & E.Schooler  Simple Conference Invitation Protocol (SCIP) – H.Schulzrinne  At this stage, IP telephony didn't really exist.  The first draft was known as "draft-ietf-mmusic-sip-00”. It included only one request type, which was a call setup request.  December 1996- A newer version “draft-ietf-mmusic-sip-01” was proposed as a modification to SIP-0  January 1999-The IETF published the draft called "draft-ietf-mmusic-sip-12". It contained the six requests that SIP has today.  March 1999- SIP published RFC 2543 as a standard. It was modified further to generate the more modern version of RFC 3261 . SHORT STORY OF SIP 6
  • 7. SIP User Agent - It is the endpoint and one of the most important network elements of a SIP network. An endpoint can initiate, modify, or terminate a session. User agents are the most intelligent device or network element of a SIP network. Simply SIP enabled device is called SIP User Agent. User agents are logically divided into two parts:  User Agent Client (UAC) : It generates requests and send those to servers.  User Agent Server (UAS) : It gets requests, processes those requests and generate responses. Note: A single UA may function as both. SIP COMPONENTS 7
  • 8.  It is the network element that takes a request from a user agent and forwards it to another user .  Basically the role of a proxy server is much like a router.  A proxy server sits in between two user agents .  There can be a maximum of 70 proxy servers in between a source and a destination. PROXY SERVER 8
  • 9.  There are two types of proxy servers:  Stateless Proxy Server : It simply forwards the message received. This type of server does not store any information of a call or a transaction.  Stateful Proxy Server : This type of proxy server keeps track of every request and response received and can use it in future if required. Note: It has no media capabilities. TYPES OF PROXY SERVER 9
  • 10. The registrar server accepts registration requests from user agents. It helps users to authenticate themselves within the network .It stores the URI and the location of a database so that other SIP servers within the same domain may take help. REGISTRAR SERVER 10
  • 11.  The redirect server receives requests and looks up the intended recipient of the request in the location database created by the registrar. Note : Simply they finds alternative locations. REDIRECT SERVER 11
  • 12.  The location server provides information about a caller's possible locations to the redirect and proxy servers. LOCATION SERVER 12
  • 14.  An INVITE request that is sent to a proxy server is responsible for initiating session.  The proxy server sends a 100 Trying response immediately to the caller (Alice) to stop the re-transmissions of the INVITE request.  The proxy server searches the address of Bob in the location server . After getting the address, it forwards the INVITE request further.  Thereafter, 180 Ringing (Provisional responses) generated by Bob is returned back to Alice.  A 200 OK response is generated soon after Bob picks the phone up . CALL FLOW 14
  • 15.  Bob receives an ACK from the Alice, once it gets 200 OK  At the same time, the session gets established and RTP packets (conversations) start flowing from both ends .  After the conversation, any participant (Alice or Bob) can send a BYE request to terminate the session.  BYE reaches directly from Alice to Bob bypassing the proxy server .  Finally Bob sends a 200 OK response to confirm the BYE and the session is terminated. CALL FLOW 15
  • 16.  SIP messages are of two types:  Requests and Responses SIP MESSAGING 16
  • 17. SIP requests contain following methods: REGISTER: Used by a UA to register to the registrar. INVITE: Used to establish a media session between user agents. ACK: ACK is used to acknowledge the final responses to an INVITE method . CANCEL: Terminates a pending request. BYE: Terminates an existing session. OPTIONS: Query servers about their capabilities . SIP REQUEST 17
  • 18. A SIP response is a message generated by a user agent server (UAS) or SIP server to reply a request generated by a client . SIP has six responses. Provisional (1xx): Request received and being processed. Success (2xx): The action was successfully received, understood, and accepted. Redirection (3xx): The client should retry the request at another server. Client Error (4xx): The request contains bad syntax or cannot be fulfilled at the server. Server Error (5xx): The server failed to fulfill an apparently valid request. Global Failure (6xx): The request cannot be fulfilled at any server. SIP RESPONSE 18
  • 19. 1xxInformational  100 Trying  180 Ringing  181 Call is Being Forwarded  182 Queued  183 Session progress 2xx Success  200 OK 4xxClient error 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 480 Temporary unavailable 486 Busy Here 487 Request Terminated 5xxServer failure 500 Server Internal Error 501 Not Implemented 503 Unavailable 6xxGlobal Failure 600 Busy Everywhere 603 Decline 604 Doesn’t Exist 3xx Redirection  301 Moved Permanently  302 Moved Temporarily  380 Alternative server SIP RESPONSE CODES 19
  • 36. AN UNSUCCESSFUL SIP CALL FLOW 36