SIP (Session Initiation Protocol) is a signaling protocol used to create, manage and terminate sessions in an IP based network. This course is for beginners and aims to give a brief introduction to SIP before one ventures into the long RFC documents.
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
Presented by: Muhammad Yeasir Arafat
ElastixWorld 2013
Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. The intention of this paper is to present an overview of IP Telephony security issues - both current and future – focusing on SIP. We start by presenting some fundamental differences between IP Telephony and the public switched telephone network (PSTN). We then look at specific problems for SIP signalling that arise from these differences. We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF. Finally, the paper gives an outlook on the security issues of IP Telephony.
Download paper at: http://elx.ec/ssiipt
Short presentation that introduces the basic concepts of SIP.
Note, some of the slides requires animations and will therefore look strange when viewed without them (e.g., see slide 17). Email me if you want the full presentation and I'll send it to you...
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
To fully appreciate SIP you need to understand its routing capabilities and how they enable SIP to traverse a network. These capabilities also help SIP deal with common network issues such as NAT and firewalls. SIP's flexible routing also enables features like application composition, a very valuable asset when designing, implementing, and building a loosely coupled system.
This presentation is for those that are looking to get a deeper understanding of SIP. Perhaps you have been tasked to spin up a completely new SIP infrastructure at work? Then you really need to understand how SIP finds its way through a network. By understanding the routing decisions SIP makes, you will be successful in your next SIP endeavor.
Questions that will be answered:
- How does a SIP request traverse the network?
- How do we know which transport to use?
- How do responses find their way back?
- Any difference for in-dialog requests?
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Join us for an introductory webinar on VoIP and learn:
- The fundamental principles of VoIP including RTP and SIP
- What voice metrics to measure and why they matter
- The different methods to monitor and troubleshoot VoIP
LinuxCon North America: SIPPing from the Open Source WellMatt Bynum
This presentation dives into where Session Initiation Protocol (SIP) and eXtensible Messaging and Presence Protocol (XMPP) are used on Linux platforms, and ultimately why SIP is the best thing to hit our communications infrastructure since the Central Office (CO). I'll discuss DNS SRV in bind to enable SIP calls via domain lookups of User Resource Identifiers (URI). I'll also go over Linux desktop and Android clients that can register to varios call control platforms.
Short presentation that introduces the basic concepts of SIP.
Note, some of the slides requires animations and will therefore look strange when viewed without them (e.g., see slide 17). Email me if you want the full presentation and I'll send it to you...
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
SIP - More than meets the eye
Speakers:
Ofer Cohen - VOIP Group Leader, LivePerson
Yossi Maimon - VOIP Technical Leader, LivePerson
An Introduction to the SIP protocol.
SIP Position in telecommunication networks and the content services.
What is SIP:
The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.
The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games.
(Source: Wikipedia)
The Session Initiation Protocol (SIP) is the dominant signaling protocol used in VoIP today. It is
responsible for the establishment, control and termination of sessions by exchanging ASCII-text-based
messages between the endpoints. This post goes through the basic components of SIP: messages and
logical entities.
To fully appreciate SIP you need to understand its routing capabilities and how they enable SIP to traverse a network. These capabilities also help SIP deal with common network issues such as NAT and firewalls. SIP's flexible routing also enables features like application composition, a very valuable asset when designing, implementing, and building a loosely coupled system.
This presentation is for those that are looking to get a deeper understanding of SIP. Perhaps you have been tasked to spin up a completely new SIP infrastructure at work? Then you really need to understand how SIP finds its way through a network. By understanding the routing decisions SIP makes, you will be successful in your next SIP endeavor.
Questions that will be answered:
- How does a SIP request traverse the network?
- How do we know which transport to use?
- How do responses find their way back?
- Any difference for in-dialog requests?
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Join us for an introductory webinar on VoIP and learn:
- The fundamental principles of VoIP including RTP and SIP
- What voice metrics to measure and why they matter
- The different methods to monitor and troubleshoot VoIP
LinuxCon North America: SIPPing from the Open Source WellMatt Bynum
This presentation dives into where Session Initiation Protocol (SIP) and eXtensible Messaging and Presence Protocol (XMPP) are used on Linux platforms, and ultimately why SIP is the best thing to hit our communications infrastructure since the Central Office (CO). I'll discuss DNS SRV in bind to enable SIP calls via domain lookups of User Resource Identifiers (URI). I'll also go over Linux desktop and Android clients that can register to varios call control platforms.
Squire Technologies: Media Gateway Presentation.
The SVI_MG SS7 Media Gateway enables cost effective, scaleable SS7 and PSTN network breakout to VoIP / 4G / LTE networks, allowing carriers to realise the cost and performance benefits of integrating into an SS7 network.
The SVI_MG range of Media Gateways are a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 2 models 1000 and 8000 to satisfy clients deployment requirements and budget.
Contents are following
• Product Overview
• Hardware Specification
• Software Service
• IP-PBX Service and Features
• RTP Proxy Service
• User Presence Service
• System Redundancy
• Network Service and Features
• User Terminals
• Application Area
Why Session Border Controllers?
Product Portfolio of the Session Border Controller
Business Applications and Use Cases (Vega ESBC)
Carrier/Service Provider Applications and Use Cases (NetBorder SBC)
Sangoma SBC Load Balancing and Failover Techniques
SBC Walkthrough
Conceptual Overview of the SBC Call Processing Components
Introduction and Configuration of SIP Profiles
Introduction and Configuration of Domain Profiles
Introduction and Configuration of Media Profiles
Introduction and Configuration of SIP Trunks
Introduction and Configuration of Call Routing
Walkthrough
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days
Участник получит представление об основе IP-телефонии, а также базовые навыки поиска уязвимостей на примере распространенных IP-PBX и абонентских устройств. Рассматриваются как типовые сетевые уязвимости, так и сложные случаи, обнаруживаемые в ходе анализа защищенности реальных сетей.
Application Visibility and Experience through Flexible NetflowCisco DevNet
The world of applications is changing rapidly in the enterprise; from the way applications are increasingly hosted in the cloud, the diverse nature of apps and to the way they are consumed by many devices. The need for organizations and network administrators is to focus on "Fast IT" - "Innovation in the Enterprise" is growing, which means having to spend less time on daily operations, maintenance and troubleshooting and more time on delivering business value with newer services. Cisco AVC with its NBAR2 technology is designed to detect applications and measure application performance through measuring round trip time, retransmission rates, jitter, delay, packet loss, MoS, URL statistics etc. Those details are transmitted using Flexible Netflow/IPFIX, so partners could leverage the data for application usage reporting, performance reporting and troubleshooting application issues to deliver best possible application experience.
Watch the DevNet 2047 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92664&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
This course describes the basic networking elements and how they are used in practice. The course covers:
The evolution and principles of networking;
The basic notions used in this domain;
Types of equipment;
Description and general information of basic networking protocols.
The practical examples provide configuration commands, packet captures and a real feel of how to build a simple network
The course attendees will be encouraged to show their understanding by answering questions and debating the issues and solutions that they might have encountered when working with networks.
Лучшие практики исполнения проекта в соответствии с методологией IBM RationalLuxoftTraining
В своем выступлении Михаил рассматривает различные аспекты реализации проекта, начиная от управления требованиями и заканчивая управлением изменениями и конфигурациями. Описывает лучшие практики минимизации рисков провала проекта, в соответствии с методологией IBM Rational:
Итеративная разработка;
Подход к управлению требованиями;
Компонентная архитектура;
Визуальное моделирование;
Постоянный контроль качества;
Управление изменениями и конфигурациями.
А также рассматривается специфика Agile-проектов в сравнении с другими методологиями.
We’ve got used to thinking about Agile testing as mainly automated testing. This aspect is really important as it enables a short feedback loop and through this feedback loop it enables safe refactoring which is one of the core aspects of Agile development. Nevertheless we tend to forget about manual testing at all. This presentation will cover one of the pillars of Agile testing that is not possible to automate. I’d like to talk about exploratory tests. I will show how we can use exploratory tests to test non-functional areas of our product – like design or domain model.
Exploratory testing is difficult. It requires a great deal of knowledge and what is even more difficult a great deal of a gut feeling that develops in the guts of an experienced tester. During my talk I will present techniques that can be used to make exploratory testing efficient and not get lost in the meanders of the product. I will show concrete heuristics that can be used to find so called hidden variables that are crucial to identify in order to go beyond the obvious. I will tell how to recognize so called trusted zones of the software and how we can leverage the area outside of a trusted zone to put a pressure on the software we’re testing.
Furthermore I will explain how exploratory testing can be used to enhance the design of the software, how we as testers can play a crucial role in defining a business domain model that is used in our software, what we need to pay attention to in order not to loose these aspects out of sight.
I will also cover an aspect of a Confirmation bias – a psychological phenomenon that used to be our best adviser in the stone-age times but right now prevents us from being a good exploratory tester or even a good tester at all. In order to fight with it we need to recognized its existence.
Finally I will give few hints on how to organize the testing process in the Agile environment as a whole, so we actually have time to explore, so we do not waste the time on finding the obvious.
От бизнес-систем к информационным системам: переход шаг за шагомLuxoftTraining
Презентация доклада Михаила Кумскова, представленного на конференции IT Arena во Львове 3 октября.
Михаил Кумсков – эксперт по методологиям управления требованиями, использования методологии RUP и инструментария IBM Rational (Системный анализ) Luxoft Training.
Чтобы управлять, надо измерять. · Что надо измерять, управляя функциональным тестированием? · Если «качество», то из чего оно складывается? · Какие показатели важны для тест-менеджера в начале, середине, конце тестирования? Для ответов на эти вопросы тест-менеджеру предлагаются количественные показатели («метрики»), которые метафорически представляются тремя стаканами, наполняемыми в ходе проекта. Что характерно для этого набора: · Прямая связь с задачами тестирования (тест-проектирование, прогон тестов, верификация дефектов) · Наглядное представление хода тестирования · Широкая применимость для разных компаний, независимость от инструментария · Унификация: разные проекты отслеживаются единым образом Приводятся примеры: · расчёты по различным первичным измерениям; · иллюстрации структуры метрик; · симптоматика проблем в ходе тестирования по динамике показателей; · добавочные «стаканы».
4 апреля в Санкт-Петербурге состоялась независимая .NET-конференция .NEXT, которая собрала более 200 .NET-программистов со всей России.
Консультант Luxoft Training по архитектуре и разработке ПО Павел Цытович представил свой доклад "Веб-служба на базе Workflow Foundation".
Концепция построения процесса тестирования в Agile проектах: 3+1LuxoftTraining
13-15 мая 2013 г. прошла онлайн-конференция Chief ConfeT&QA, посвященная различным вопросам тестирования: от методов приоритизации тестирования до синдрома профессионального выгорания в тестировании.
Елена Саламаха, тренер Luxoft Training, представила доклад о трёх основных концепциях построения тестирования в Agile:
• Техники предотвращения появления дефектов
• Автоматизация, Непрерывная интеграция
• Концепция постоянного улучшения, «гибкого внедрения гибкости»
Также в своем докладе Елена ответила на ряд вопросов:
• Как избежать непредвиденных багов?
• Как избежать недопонимания и разночтения требований?
• Как избежать рутинной ручной и, часто лишней, работы?
• Как поддерживать стабильный уровень качества в условиях частых поставок?
• Как не потеряться в постоянных изменениях?
31 мая – 1 июня в Киеве состоялась конференция HOTCODE 2013.
Сергей Тепляков, эксперт Luxoft Training по .Net, С++ и архитектуре приложений, выступил с докладом «C# Deep Dive».
Тезисы доклада:
«Когда-то в далеком 2002-м году язык C# был прост, как 2 копейки. Но у любого «живого» языка есть одна особенность, приятная и неприятная одновременно — в язык начинают добавляться новые возможности, чтобы наши с вами типовые задачи решались проще и эффективнее. Но с каждой новой возможностью появляются и свои тонкости, незнание которых может лишить столь нужных в нашей жизни конечностей, причем иногда самым изощренным образом. А поскольку язык C# развивается очень динамично, то за время жизни на его просторах появилось много маленьких грабелек, которые мы с вами и научимся обходить ;)».
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
3. 3
VoIP stereotypes
VoIP means free calls
SIP is a collection of protocols
SIP is better than H323
SIP is a voice signaling protocol
4. 4
VoIP
VoIP
– VoIP: Voice over Internet Protocol
IP Telephony
Internet Telephony
Voice over Broadband (VoBB)
Broadband Telephony
Broadband Phone
– Alternative to PSTN
– Single infrastructure for Data, Voice and Video
– More demand for video conferences is easily satisfied with VoIP
– Cost savings on long distance calls
– Easier connectivity: customers are to be reached at multiple points
under the same “telephone number”
– Communication Services
Voice/Video
Fax
Voice/Messaging Application
5. 5
VoIP
VoIP Protocols
– SIP – Session Initiation Protocol
– H.323
– IMS – IP Multimedia Subsystem
– MGCP – Media Gateway Control Protocol
– RTP – Real-time Transport Protocol
– RTCP – Real-time Transport Control Protocol
– SDP – Session Description Protocol
– Skype Protocol (proprietary)
– TCP – Transmission Control Protocol
– UDP – User Datagram Protocol
– TLS – Transport Layer Security
33. 33
SDP - WireShark
Session Description Protocol Version - 0
Owner / Creator of the session or Owner / Creator. Identification is made by:
– Owner username. User.
– Session ID. ID of the session. Random number as a unique identifier of the session.
– Session Version. Version.
– Network Type. Tipe network. Always IN.
– Address Type. It can be IP4 (IPv4) or IP 6 (IPv6).
– Address (IP). IP Address. (200.57.7.197)
– Session Name. Name of the session.
Connection Information:
– C = Connection Type Network (IN)
– Connection Address Type: (IP4 or IPv6)
– Connection Address: (200.57.7.197)
Time Description, active time. (t): 0 0, start stop time = 0. [unrestricted and permanent session].
Media Description, name and address (m): audio 40376 RTP / AVP 4 0 8 18. Type of data being transported (audio or telephone session in this
case), UDP port used (40 376), protocol used (Real Time Transport Protocol RTP / AVP Audio Video Profiles). Codecs formats:
– 8 G.711 PCMA
– 18 G.729
– 4 G.723
– 0 G.711 PCMU
Media Attribute (a). This is a list of format codes outlined above with data from Sample rate or sampling frequency, fieldname, etc.
Media Attribute (a). SendRecv. So send / receive.