SlideShare a Scribd company logo
1 of 58
© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
VoIP & SIP Signaling
Hussam El Kebbi
Presentation_ID 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Overview
 VoIP Architecture
 What is VoIP ?
 Benefits of VoIP
 Components of a VoIP Network
 Quiz
 VoIP Telephone Call
 Overview on a VoIP Connection
 Analog/Digital Interfaces
 Steps of Conversion
 Transport Layer
 QoS in VoIP/Solutions for QoS Issues
 Calculating Bandwidth Requirements for VoIP
 Cisco IOS Configurations for VoIP
 Quiz
Presentation_ID 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 SIP Architecture
 What is SIP?
 SIP Capabilities
 SIP URI / Components
 Quiz
 SIP Message Format
 SIP Message
 Request/Response Fields
 Header Fields
 Quiz
 SIP Call Flow
 Using Proxy Server/Using Multiple Servers
 How are the Codecs Negotiated / SDP Information
 SIP Security Mechanisms
 QUIZ
Overview
Presentation_ID 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VoIP Architecture
Presentation_ID 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VoIP Architecture
Voice over IP (VoIP) defines a way to carry voice calls over
an IP network including the digitization and packetization of
the voice streams
What is VoIP ?
http://www.cisco.com/en/US/tech/tk652/tk701/tsd_technology_support_protocol_home.html
Presentation_ID 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of VoIP
 More efficient use of bandwidth and equipment
 Reduce operating costs
 Consolidated network expenses
 Improved employee productivity
 Access to new communication devices
VoIP Architecture
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Components of a VoIP Network
These are the most common elements in VoIP networks:
VoIP Architecture
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quiz
 Define VoIP, and list two of its benefits ?
 List three of VoIP network components ?
VoIP Architecture
Presentation_ID 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VoIP Telephone Call
Presentation_ID 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
To setup a VoIP communication we need:
 Convert analog voice to digital signals (bits)
 Now the bits have to be compressed in a good format for
transmission
 Insert our voice packets in data packets using a real-time protocol
(typically RTP over UDP over IP)
 We need a signaling protocol to call users (SIP - H.323)
 At Receiving we have to disassemble packets, extract data, then
convert them to analog voice signals
 All that must be done in a real time fashion cause we cannot waiting
for too long for a vocal answer! (QoS )
Overview on a VoIP connection
http://tldp.org/HOWTO/VoIP-HOWTO-4.html
VoIP Telephone Call
Presentation_ID 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Foreign Exchange Station (FXS)
 Foreign Exchange Office (FXO)
 Ear and Mouth (E&M)
Legacy Analog Interfaces in VoIP Networks
Digital Interfaces
Analog Interfaces
VoIP Telephone Call
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Click me
Presentation_ID 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Converting Analog Signals to Digital Signals
 Sample the analog signal (Sampling)
 Quantize sample into a binary expression (Quantization)
 Compress the samples to reduce bandwidth
Converting Digital Signals to Analog Signals
 Decompress the samples
 Decode the samples into voltage amplitudes
 Reconstruct the analog signal
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
VoIP Telephone Call
Steps of Conversion
Click me
Presentation_ID 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
To calculate the total bandwidth, find the total packet size, including all
the headers plus payload and divide by the payload size. Multiply the
result by the nominal bandwidth for the codec. The result is the total
bandwidth requirement.
VoIP Telephone Call
Calculating Bandwidth Requirements for VoIP
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
You can calculate the bandwidth using the Voice Codec Bandwidth Calculator at
http://tools.cisco.com/Support/VBC/do/
CodecCalc1.do.
Presentation_ID 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Real-time applications such as voice and video require a guaranteed
connection with consistent and predictable delay characteristics.
IP does not guarantee reliability, flow control, error detection, or error
correction
 TCP offers both connection-oriented and reliable transmission
- Handles sequencing and error detection to ensure that the destination
application receives a reliable stream of data
 UDP, like IP, is a connectionless protocol.
- Routes data to its correct destination port but does not attempt to
perform any sequencing or to ensure data reliability
Transport Layer
VoIP Telephone Call
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 RTP solves the problem enabling the receiver to put the packets back
into the correct order and not wait too long for packets that have either
lost their way or are taking too long to arrive
- RTP transports the digitized samples of real-time information
- The packets can be correctly reordered
- The packets can have appropriate delays inserted between packets
Transport Layer
VoIP Telephone Call
VoIP doesn't use TCP because it is too heavy for real time
applications
CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Latency: Delay for packet delivery
 Jitter: Variations in delay of packet delivery
 Packet loss: Too much traffic in the network causes the network to
drop packets
 Burstiness of Loss and Jitter: Loss and Discards (due to jitter)
tend to occur in bursts
QoS (Quality of Service) is a major issue in VOIP
implementations, things to consider are:
VoIP Telephone Call
QoS in VoIP
http://www.voip-info.org/wiki/view/QoS
Presentation_ID 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Solution for QoS issues
 Resource reservation : Make sure that the VoIP call has the
bandwidth needed allocated from point to point before the
conversation takes place.
 Prioritization: Here, the end point suggest a priority on the packets
and each router decides if it will honour this request or not.
 Network Traffic Tuning: Boxes you can add to a network to
manage bandwidth usage and create QOS even if the other network
devices don't support it.
VoIP Telephone Call
http://www.voip-info.org/wiki/view/QoS
Presentation_ID 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IOS Configurations for VoIP
http://www.cisco.com/en/US/products/hw/routers/ps221/products_configuration_guide_chapter09186a008007c9bc.html
Presentation_ID 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quiz
 Which three components should be taken into
consideration when calculating the voice bandwidth needed
to set up a call on a VoIP network? (Choose three)
1. Voice payload size
2. RTP, UDP, and IP headers
3. Layer 2 encapsulation
4. Low latency queuing (LLQ)
5. Classification and marking of the voice traffic
6. Call Admission Control enabled on the network
VoIP Telephone Call
Presentation_ID 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Does VoIP use TCP as transport protocol?Why?
VoIP Telephone Call
Quiz
Presentation_ID 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Architecture
Presentation_ID 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Architecture
 The Internet Engineering Task Force's (IETF's)
standard for multimedia conferencing over IP
 A signaling protocol used to create, manage and
terminate sessions in an IP based network.
 A client/server protocol, which is similar to HTTP
 Influencing the marketplace, a growing number of IP
Telephony Service Providers (ITSP)/ cellular phone
providers, Microsoft real-time communication platforms,
and Cisco applications are based on SIP
Session Initiation Protocol (SIP) is :
What is SIP?
Presentation_ID 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presence, Instant Messaging and Voice
Presentation_ID 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Determine the location of the target end point
 Determine the media capabilities of the target end
point—Via Session Description Protocol (SDP)
 Determine the availability of the target end point
Establish a session between the originating and target
end point
 Handle the transfer and termination of calls
SIP Capabilities :
SIP Architecture
Click me
Presentation_ID 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 A user of an online service
 An appearance on a multiline phone
 A mailbox on a messaging system
 A telephone number at a gateway service
SIP URIs have a format based on e-mail address formats, namely
user@domain. There are two common schemes. An ordinary SIP URI is of
the form: sip:bob@biloxi.com
The URI may also include a password, port number, and related parameters.
SIP Architecture
SIP Universal Resource Indicators
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
A resource within a SIP configuration is identified by a URI.
Examples of communications resources include the following:
Presentation_ID 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 User agent client (UAC)
 User agent server (UAS)
SIP Components
Functional Components :
 Proxy server : Perform call routing, authentication, authorization,
address resolution, and loop detection
 Redirect server : UAs and proxy servers can contact a redirect server to
find the location of an end point
 Registrar : Processes requests from UACs for registration of their current
location
SIP Architecture
SIP is a peer-to-peer protocol, can function in one of the
following roles:
Click me
SIP User
Agents
Presentation_ID 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quiz
 What is SIP?
 Name 3 Funtional Components of SIP Architecture?
SIP Architecture
Presentation_ID 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Message Format
Presentation_ID 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Message Format
SIP is a simple, ASCII text-based protocol that uses requests and
responses to establish communication among the various components in
the network
generic-message = start-line ;start-line = Request-Line / Status-Line
*message-header
CRLF ; carriage-return line-feed sequence
[ message-body ]
SIP Message
http://www.tech-invite.com/Ti-sip-abnf.html
Presentation_ID 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Status-Line = SIP-Version SP Status code SP Reason-phrase CRLF
 SIP version : The SIP version being used.
 Status-code : A 3-digit integer result code of the attempt to understand and
satisfy the request.
 Reason-phrase : A textual description of the status code.
SIP Message Format
Response Fields
Request Fields
Request-Line = Method SP Request-URI SP SIP-Version CRLF
 Method : Register, Invite, Ack, Cancel, Bye, and Options
 Request-URI : It indicates the user or service to which this request is being
addressed
 SIP version : Is case-insensitive but implementations must send upper case
Presentation_ID 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Provisional (1xx): The request was received and is being
processed.
 Success (2xx): The action was successfully received,
understood, and accepted.
 Redirection (3xx): Further action needs to be taken in order to
complete the request.
 Client Error (4xx): The request contains bad syntax or cannot
be fulfilled at this server.
 Server Error (5xx): The server failed to fulfill an apparently valid
request.
 Global Failure (6xx): The request cannot be fulfilled at any
server.
SIP Message Format
Response
The SIP response types defined in RFC 3261 are in the
following categories:
www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
Presentation_ID 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Header Fields
 To : Specifies the desired "logical" recipient of the request
 From : Indicates the logical identity of the initiator of the request
 CSeq : Provide a means to uniquely identify transactions
 Call-ID : Acts as a unique identifier to group together a series of messages
 Contact : Provides a URI whose meaning depends on the type of request or
response it is in.
 Via : Indicates the path taken by the request so far and indicates the path
that should be followed in routing responses
SIP Message Format
A valid SIP request formulated by a UAC MUST, at a
minimum, contain following header fields:
http://www.networksorcery.com/enp/protocol/sip.htm
Presentation_ID 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
INVITE sip:bob@biloxi.com SIP/2.0
Via: SIP/2.0/UDP 12.26.17.91:5060
Max-Forwards: 70
To: Bob <sip:bob@biloxi.com
From: Alice <sip:alice@atlanta.com;tag=1928301774
Call-ID: a84b4c76e66710@12.26.17.91
CSeq: 314159 INVITE
Contact: <sip:alice@atlanta.com>
Content-Type: application/sdp
Content-Length: 142
SIP Message Format
Request Example
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
Presentation_ID 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Response Example
SIP/2.0 200 OK
Via: SIP/2.0/UDP server10.biloxi.com
Via: SIP/2.0/UDP bigbox3.site3.atlanta.com
Via: SIP/2.0/UDP 12.26.17.91:5060
To: Bob <sip:bob@biloxi.com;tag=a6c85cf
From: Alice <sip:alice@atlanta.com;tag=1928301774
Call-ID: a84b4c76e66710@12.26.17.91
CSeq: 314159 INVITE
Contact: <sip:bob@biloxi.com>
Content-Type: application/sdp
Content-Length: 131
SIP Message Format
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
Presentation_ID 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quiz
 SIP Message code basis are ?
 Binary
 ASCII
 What are the Fields of SIP Message ?
SIP Message Format
Presentation_ID 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Call Flow
Presentation_ID 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Call Flow
Figure 1, Using proxy server
Presentation_ID 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Figure 2, Using multiple servers
SIP Call Flow
Presentation_ID 39© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
How are the Codecs negotiated?
 SDP is the protocol used by the UAs to tell each other what codecs they
support. SDP is embedded into the SIP Messages.
SDP is intended for describing multimedia sessions for the purposes
of session announcement, session invitation, and other forms of
multimedia session initiation
 SDP, defined in RFC 2327, describes the content of sessions, including
telephony, Internet radio, and multimedia applications
SIP Call Flow
Session Descripton Protocol (SDP)
v=0
o=CiscoSystemsCCM-SIP 2000 1000 IN IP4 10.6.2.10
s=SIP Call c=IN IP4 10.6.2.10
t=0 0
m=audio 24580 RTP/AVP 0 101
a=sendrecv
a=rtpmap:0 PCMU/800
http://www.ietf.org/rfc/rfc2327.txt
Presentation_ID 40© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Media streams: A session can include multiple streams of differing
content. SDP currently defines audio, video, data, control, and
application as stream types.
 Addresses: SDP indicates the destination addresses, which may be a
multicast address, for a media stream.
 Ports: For each stream, the UDP port numbers for sending and
receiving are specified.
 Payload types: For each media stream type in use (for example,
telephony), the payload type indicates the media formats that can be
used during the session.
 Start and stop times: These apply to broadcast sessions, for example,
a television or radio program. The start, stop, and repeat times of the
session are indicated.
 Originator: For broadcast sessions, the originator is specified, with
contact information. This may be useful if a receiver encounters technical
difficulties.
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
SIP Call Flow
SDP Information :
Presentation_ID 41© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Why SDP is used ?
SIP Call Flow
Quiz
Presentation_ID 42© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Security
 Internet Telephony uses a variety of signaling protocols,
such as H.323, SIP, MGCP and MEGACO, for initiating
VOIP calls.
 SIP, like other Internet Protocols, is vulnerable to known
Internet attacks.
 VOIP suffers from all known attacks associated with
any Internet application or subsystem
SIP Security Mechanisms
Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
Presentation_ID 43© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Client-A drops the call just initiated
SIP Security Mechanisms
Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
DoS Attack
Presentation_ID 44© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Call Hijack
SIP Security Mechanisms
Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
Threats
Presentation_ID 45© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Identity Theft
SIP Security Mechanisms
Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
Presentation_ID 46© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Registration and call signaling/media should be
authenticated
 End-to-end
- Digest authentication (challenge - response)
- S/MIME
 Hop-by-hop
- TLS, IPsec
- SIPS
SIP Security Mechanisms
Presentation_ID 47© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ways to ensure signaling security in SIP:
 HTTP Digest: prone to eavesdropping, replay, and MiTM attacks.
Provides authentication only.
 TLS: Hop-by-hop SIP transport security; not end-to-end! Provides
confidentiality, authentication, encryption.
 S/MIME : End-to-end signaling and body security. Provides
confidentiality, authentication, encryption.
 IPSec: Layer 3 security. Provides confidentiality and encryption.
SIP Security Mechanisms
Presentation_ID 48© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Quiz
 Which are Hop-by-hop / End-to-end SIP transport
security?
 TLS
 IPSEC
 HTTP Digest
 S/MIMe End-to-end
SIP Security Mechanisms
Presentation_ID 49© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presence, Instant Messaging and Voice
Thank You
Hussam El Kebbi
Presentation_ID 50© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 51© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 52© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.cs.columbia.edu/IRT/sipc/doc/html/images/monitor.png
Presentation_ID 53© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 54© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCisco Interfaces
BRI
T1
EI
Presentation_ID 55© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCCNP: Optimizing Converged Networks v5.0NT, Chapter 2
Presentation_ID 56© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.cisco.com/univercd/cc/td/doc/product/voice/sipsols/biggulp/bgsipov.pdf
Presentation_ID 57© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.tech-invite.com/Ti-sip-abnf.html
Presentation_ID 58© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SIP Components / Servers / Services
SIP User
Agents
Registrar Redirect
Location
Database
SIP Proxy
SIP Servers /
Services
REGISTER
“Here I am”
INVITE
“I want to talk
to another UA”
Proxied INVITE
“I’ll handle it for
you”
“Where is this
name/phone#?”
3xx Redirection
“They moved,
try this address”
SIP User
Agents
SIP-GW
http://www.cisco.com/

More Related Content

What's hot

SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesOxfordCambridge
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Modelsguesta5f2fb
 
Vo Ip Rajibdeka
Vo Ip RajibdekaVo Ip Rajibdeka
Vo Ip Rajibdekarajibdk
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingThousandEyes
 
session-initiation-protocol
session-initiation-protocolsession-initiation-protocol
session-initiation-protocolSailee Choudhary
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONKarama Said(BEng,MSc)
 
Advanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vnAdvanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vnTran Thanh
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise NetworkDan York
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Core Stor Ip Recording V1
Core Stor Ip Recording V1Core Stor Ip Recording V1
Core Stor Ip Recording V1Firoze Hussain
 

What's hot (20)

SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Models
 
Sangoma SS7 Gateway Training
Sangoma SS7 Gateway TrainingSangoma SS7 Gateway Training
Sangoma SS7 Gateway Training
 
Vo Ip Rajibdeka
Vo Ip RajibdekaVo Ip Rajibdeka
Vo Ip Rajibdeka
 
What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
VOIP
VOIPVOIP
VOIP
 
voip gateway
 voip gateway voip gateway
voip gateway
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
session-initiation-protocol
session-initiation-protocolsession-initiation-protocol
session-initiation-protocol
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATION
 
Advanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vnAdvanced topologies for microsoft e learning shared by voip.com.vn
Advanced topologies for microsoft e learning shared by voip.com.vn
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
Vo ip
Vo ipVo ip
Vo ip
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Core Stor Ip Recording V1
Core Stor Ip Recording V1Core Stor Ip Recording V1
Core Stor Ip Recording V1
 

Viewers also liked

Viewers also liked (14)

Indroduction to SIP
Indroduction to SIPIndroduction to SIP
Indroduction to SIP
 
V.O.I.P
V.O.I.PV.O.I.P
V.O.I.P
 
Final report of dcn
Final report of dcnFinal report of dcn
Final report of dcn
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
VoIP Recording
VoIP RecordingVoIP Recording
VoIP Recording
 
Voip
Voip Voip
Voip
 
Voip
VoipVoip
Voip
 
2016-02-17 research seminar
2016-02-17 research seminar2016-02-17 research seminar
2016-02-17 research seminar
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
Final ppt
Final pptFinal ppt
Final ppt
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
MGCP Overview
MGCP OverviewMGCP Overview
MGCP Overview
 

Similar to Vo ip sip

AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia Systemmanymbaboy
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lteCPqD
 
tftyfty.ppt
tftyfty.ppttftyfty.ppt
tftyfty.pptAlKir1
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.pptnebepa7907
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
Voice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALAVoice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALASaikiran Panjala
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & ImplementationAhmed A. Arefin
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseAlok Vasudeva
 

Similar to Vo ip sip (20)

AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia System
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Sip1
Sip1Sip1
Sip1
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
 
1. VoIP.ppt
1. VoIP.ppt1. VoIP.ppt
1. VoIP.ppt
 
tftyfty.ppt
tftyfty.ppttftyfty.ppt
tftyfty.ppt
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
VOIP Pros & Cons
VOIP Pros & ConsVOIP Pros & Cons
VOIP Pros & Cons
 
Voice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALAVoice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALA
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
ccna project
ccna projectccna project
ccna project
 
Configuring-Cisco-CME.ppt
Configuring-Cisco-CME.pptConfiguring-Cisco-CME.ppt
Configuring-Cisco-CME.ppt
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the Enterprise
 

Recently uploaded

VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 

Vo ip sip

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 VoIP & SIP Signaling Hussam El Kebbi
  • 2. Presentation_ID 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Overview  VoIP Architecture  What is VoIP ?  Benefits of VoIP  Components of a VoIP Network  Quiz  VoIP Telephone Call  Overview on a VoIP Connection  Analog/Digital Interfaces  Steps of Conversion  Transport Layer  QoS in VoIP/Solutions for QoS Issues  Calculating Bandwidth Requirements for VoIP  Cisco IOS Configurations for VoIP  Quiz
  • 3. Presentation_ID 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  SIP Architecture  What is SIP?  SIP Capabilities  SIP URI / Components  Quiz  SIP Message Format  SIP Message  Request/Response Fields  Header Fields  Quiz  SIP Call Flow  Using Proxy Server/Using Multiple Servers  How are the Codecs Negotiated / SDP Information  SIP Security Mechanisms  QUIZ Overview
  • 4. Presentation_ID 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential VoIP Architecture
  • 5. Presentation_ID 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential VoIP Architecture Voice over IP (VoIP) defines a way to carry voice calls over an IP network including the digitization and packetization of the voice streams What is VoIP ? http://www.cisco.com/en/US/tech/tk652/tk701/tsd_technology_support_protocol_home.html
  • 6. Presentation_ID 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of VoIP  More efficient use of bandwidth and equipment  Reduce operating costs  Consolidated network expenses  Improved employee productivity  Access to new communication devices VoIP Architecture CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 7. Presentation_ID 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Components of a VoIP Network These are the most common elements in VoIP networks: VoIP Architecture CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 8. Presentation_ID 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quiz  Define VoIP, and list two of its benefits ?  List three of VoIP network components ? VoIP Architecture
  • 9. Presentation_ID 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential VoIP Telephone Call
  • 10. Presentation_ID 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential To setup a VoIP communication we need:  Convert analog voice to digital signals (bits)  Now the bits have to be compressed in a good format for transmission  Insert our voice packets in data packets using a real-time protocol (typically RTP over UDP over IP)  We need a signaling protocol to call users (SIP - H.323)  At Receiving we have to disassemble packets, extract data, then convert them to analog voice signals  All that must be done in a real time fashion cause we cannot waiting for too long for a vocal answer! (QoS ) Overview on a VoIP connection http://tldp.org/HOWTO/VoIP-HOWTO-4.html VoIP Telephone Call
  • 11. Presentation_ID 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Foreign Exchange Station (FXS)  Foreign Exchange Office (FXO)  Ear and Mouth (E&M) Legacy Analog Interfaces in VoIP Networks Digital Interfaces Analog Interfaces VoIP Telephone Call CCNP: Optimizing Converged Networks v5.0NT, Chapter 2 Click me
  • 12. Presentation_ID 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Converting Analog Signals to Digital Signals  Sample the analog signal (Sampling)  Quantize sample into a binary expression (Quantization)  Compress the samples to reduce bandwidth Converting Digital Signals to Analog Signals  Decompress the samples  Decode the samples into voltage amplitudes  Reconstruct the analog signal CCNP: Optimizing Converged Networks v5.0NT, Chapter 2 VoIP Telephone Call Steps of Conversion Click me
  • 13. Presentation_ID 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential To calculate the total bandwidth, find the total packet size, including all the headers plus payload and divide by the payload size. Multiply the result by the nominal bandwidth for the codec. The result is the total bandwidth requirement. VoIP Telephone Call Calculating Bandwidth Requirements for VoIP CCNP: Optimizing Converged Networks v5.0NT, Chapter 2 You can calculate the bandwidth using the Voice Codec Bandwidth Calculator at http://tools.cisco.com/Support/VBC/do/ CodecCalc1.do.
  • 14. Presentation_ID 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Real-time applications such as voice and video require a guaranteed connection with consistent and predictable delay characteristics. IP does not guarantee reliability, flow control, error detection, or error correction  TCP offers both connection-oriented and reliable transmission - Handles sequencing and error detection to ensure that the destination application receives a reliable stream of data  UDP, like IP, is a connectionless protocol. - Routes data to its correct destination port but does not attempt to perform any sequencing or to ensure data reliability Transport Layer VoIP Telephone Call CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 15. Presentation_ID 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  RTP solves the problem enabling the receiver to put the packets back into the correct order and not wait too long for packets that have either lost their way or are taking too long to arrive - RTP transports the digitized samples of real-time information - The packets can be correctly reordered - The packets can have appropriate delays inserted between packets Transport Layer VoIP Telephone Call VoIP doesn't use TCP because it is too heavy for real time applications CCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 16. Presentation_ID 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Latency: Delay for packet delivery  Jitter: Variations in delay of packet delivery  Packet loss: Too much traffic in the network causes the network to drop packets  Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts QoS (Quality of Service) is a major issue in VOIP implementations, things to consider are: VoIP Telephone Call QoS in VoIP http://www.voip-info.org/wiki/view/QoS
  • 17. Presentation_ID 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Solution for QoS issues  Resource reservation : Make sure that the VoIP call has the bandwidth needed allocated from point to point before the conversation takes place.  Prioritization: Here, the end point suggest a priority on the packets and each router decides if it will honour this request or not.  Network Traffic Tuning: Boxes you can add to a network to manage bandwidth usage and create QOS even if the other network devices don't support it. VoIP Telephone Call http://www.voip-info.org/wiki/view/QoS
  • 18. Presentation_ID 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IOS Configurations for VoIP http://www.cisco.com/en/US/products/hw/routers/ps221/products_configuration_guide_chapter09186a008007c9bc.html
  • 19. Presentation_ID 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quiz  Which three components should be taken into consideration when calculating the voice bandwidth needed to set up a call on a VoIP network? (Choose three) 1. Voice payload size 2. RTP, UDP, and IP headers 3. Layer 2 encapsulation 4. Low latency queuing (LLQ) 5. Classification and marking of the voice traffic 6. Call Admission Control enabled on the network VoIP Telephone Call
  • 20. Presentation_ID 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Does VoIP use TCP as transport protocol?Why? VoIP Telephone Call Quiz
  • 21. Presentation_ID 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Architecture
  • 22. Presentation_ID 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Architecture  The Internet Engineering Task Force's (IETF's) standard for multimedia conferencing over IP  A signaling protocol used to create, manage and terminate sessions in an IP based network.  A client/server protocol, which is similar to HTTP  Influencing the marketplace, a growing number of IP Telephony Service Providers (ITSP)/ cellular phone providers, Microsoft real-time communication platforms, and Cisco applications are based on SIP Session Initiation Protocol (SIP) is : What is SIP?
  • 23. Presentation_ID 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presence, Instant Messaging and Voice
  • 24. Presentation_ID 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Determine the location of the target end point  Determine the media capabilities of the target end point—Via Session Description Protocol (SDP)  Determine the availability of the target end point Establish a session between the originating and target end point  Handle the transfer and termination of calls SIP Capabilities : SIP Architecture Click me
  • 25. Presentation_ID 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  A user of an online service  An appearance on a multiline phone  A mailbox on a messaging system  A telephone number at a gateway service SIP URIs have a format based on e-mail address formats, namely user@domain. There are two common schemes. An ordinary SIP URI is of the form: sip:bob@biloxi.com The URI may also include a password, port number, and related parameters. SIP Architecture SIP Universal Resource Indicators http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html A resource within a SIP configuration is identified by a URI. Examples of communications resources include the following:
  • 26. Presentation_ID 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  User agent client (UAC)  User agent server (UAS) SIP Components Functional Components :  Proxy server : Perform call routing, authentication, authorization, address resolution, and loop detection  Redirect server : UAs and proxy servers can contact a redirect server to find the location of an end point  Registrar : Processes requests from UACs for registration of their current location SIP Architecture SIP is a peer-to-peer protocol, can function in one of the following roles: Click me SIP User Agents
  • 27. Presentation_ID 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quiz  What is SIP?  Name 3 Funtional Components of SIP Architecture? SIP Architecture
  • 28. Presentation_ID 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Message Format
  • 29. Presentation_ID 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Message Format SIP is a simple, ASCII text-based protocol that uses requests and responses to establish communication among the various components in the network generic-message = start-line ;start-line = Request-Line / Status-Line *message-header CRLF ; carriage-return line-feed sequence [ message-body ] SIP Message http://www.tech-invite.com/Ti-sip-abnf.html
  • 30. Presentation_ID 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Status-Line = SIP-Version SP Status code SP Reason-phrase CRLF  SIP version : The SIP version being used.  Status-code : A 3-digit integer result code of the attempt to understand and satisfy the request.  Reason-phrase : A textual description of the status code. SIP Message Format Response Fields Request Fields Request-Line = Method SP Request-URI SP SIP-Version CRLF  Method : Register, Invite, Ack, Cancel, Bye, and Options  Request-URI : It indicates the user or service to which this request is being addressed  SIP version : Is case-insensitive but implementations must send upper case
  • 31. Presentation_ID 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Provisional (1xx): The request was received and is being processed.  Success (2xx): The action was successfully received, understood, and accepted.  Redirection (3xx): Further action needs to be taken in order to complete the request.  Client Error (4xx): The request contains bad syntax or cannot be fulfilled at this server.  Server Error (5xx): The server failed to fulfill an apparently valid request.  Global Failure (6xx): The request cannot be fulfilled at any server. SIP Message Format Response The SIP response types defined in RFC 3261 are in the following categories: www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
  • 32. Presentation_ID 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Header Fields  To : Specifies the desired "logical" recipient of the request  From : Indicates the logical identity of the initiator of the request  CSeq : Provide a means to uniquely identify transactions  Call-ID : Acts as a unique identifier to group together a series of messages  Contact : Provides a URI whose meaning depends on the type of request or response it is in.  Via : Indicates the path taken by the request so far and indicates the path that should be followed in routing responses SIP Message Format A valid SIP request formulated by a UAC MUST, at a minimum, contain following header fields: http://www.networksorcery.com/enp/protocol/sip.htm
  • 33. Presentation_ID 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential INVITE sip:bob@biloxi.com SIP/2.0 Via: SIP/2.0/UDP 12.26.17.91:5060 Max-Forwards: 70 To: Bob <sip:bob@biloxi.com From: Alice <sip:alice@atlanta.com;tag=1928301774 Call-ID: a84b4c76e66710@12.26.17.91 CSeq: 314159 INVITE Contact: <sip:alice@atlanta.com> Content-Type: application/sdp Content-Length: 142 SIP Message Format Request Example http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
  • 34. Presentation_ID 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Response Example SIP/2.0 200 OK Via: SIP/2.0/UDP server10.biloxi.com Via: SIP/2.0/UDP bigbox3.site3.atlanta.com Via: SIP/2.0/UDP 12.26.17.91:5060 To: Bob <sip:bob@biloxi.com;tag=a6c85cf From: Alice <sip:alice@atlanta.com;tag=1928301774 Call-ID: a84b4c76e66710@12.26.17.91 CSeq: 314159 INVITE Contact: <sip:bob@biloxi.com> Content-Type: application/sdp Content-Length: 131 SIP Message Format http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html
  • 35. Presentation_ID 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quiz  SIP Message code basis are ?  Binary  ASCII  What are the Fields of SIP Message ? SIP Message Format
  • 36. Presentation_ID 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Call Flow
  • 37. Presentation_ID 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Call Flow Figure 1, Using proxy server
  • 38. Presentation_ID 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Figure 2, Using multiple servers SIP Call Flow
  • 39. Presentation_ID 39© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential How are the Codecs negotiated?  SDP is the protocol used by the UAs to tell each other what codecs they support. SDP is embedded into the SIP Messages. SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation  SDP, defined in RFC 2327, describes the content of sessions, including telephony, Internet radio, and multimedia applications SIP Call Flow Session Descripton Protocol (SDP) v=0 o=CiscoSystemsCCM-SIP 2000 1000 IN IP4 10.6.2.10 s=SIP Call c=IN IP4 10.6.2.10 t=0 0 m=audio 24580 RTP/AVP 0 101 a=sendrecv a=rtpmap:0 PCMU/800 http://www.ietf.org/rfc/rfc2327.txt
  • 40. Presentation_ID 40© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Media streams: A session can include multiple streams of differing content. SDP currently defines audio, video, data, control, and application as stream types.  Addresses: SDP indicates the destination addresses, which may be a multicast address, for a media stream.  Ports: For each stream, the UDP port numbers for sending and receiving are specified.  Payload types: For each media stream type in use (for example, telephony), the payload type indicates the media formats that can be used during the session.  Start and stop times: These apply to broadcast sessions, for example, a television or radio program. The start, stop, and repeat times of the session are indicated.  Originator: For broadcast sessions, the originator is specified, with contact information. This may be useful if a receiver encounters technical difficulties. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/sip.html SIP Call Flow SDP Information :
  • 41. Presentation_ID 41© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Why SDP is used ? SIP Call Flow Quiz
  • 42. Presentation_ID 42© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Security  Internet Telephony uses a variety of signaling protocols, such as H.323, SIP, MGCP and MEGACO, for initiating VOIP calls.  SIP, like other Internet Protocols, is vulnerable to known Internet attacks.  VOIP suffers from all known attacks associated with any Internet application or subsystem SIP Security Mechanisms Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
  • 43. Presentation_ID 43© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Client-A drops the call just initiated SIP Security Mechanisms Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd DoS Attack
  • 44. Presentation_ID 44© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Call Hijack SIP Security Mechanisms Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd Threats
  • 45. Presentation_ID 45© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Identity Theft SIP Security Mechanisms Saverio Niccolini, Ph. D.Research Staff Member @ Network Laboratories NEC Europe Ltd
  • 46. Presentation_ID 46© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Registration and call signaling/media should be authenticated  End-to-end - Digest authentication (challenge - response) - S/MIME  Hop-by-hop - TLS, IPsec - SIPS SIP Security Mechanisms
  • 47. Presentation_ID 47© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ways to ensure signaling security in SIP:  HTTP Digest: prone to eavesdropping, replay, and MiTM attacks. Provides authentication only.  TLS: Hop-by-hop SIP transport security; not end-to-end! Provides confidentiality, authentication, encryption.  S/MIME : End-to-end signaling and body security. Provides confidentiality, authentication, encryption.  IPSec: Layer 3 security. Provides confidentiality and encryption. SIP Security Mechanisms
  • 48. Presentation_ID 48© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Quiz  Which are Hop-by-hop / End-to-end SIP transport security?  TLS  IPSEC  HTTP Digest  S/MIMe End-to-end SIP Security Mechanisms
  • 49. Presentation_ID 49© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presence, Instant Messaging and Voice Thank You Hussam El Kebbi
  • 50. Presentation_ID 50© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 51. Presentation_ID 51© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 52. Presentation_ID 52© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.cs.columbia.edu/IRT/sipc/doc/html/images/monitor.png
  • 53. Presentation_ID 53© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 54. Presentation_ID 54© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCisco Interfaces BRI T1 EI
  • 55. Presentation_ID 55© 2007 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialCCNP: Optimizing Converged Networks v5.0NT, Chapter 2
  • 56. Presentation_ID 56© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.cisco.com/univercd/cc/td/doc/product/voice/sipsols/biggulp/bgsipov.pdf
  • 57. Presentation_ID 57© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidentialhttp://www.tech-invite.com/Ti-sip-abnf.html
  • 58. Presentation_ID 58© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential SIP Components / Servers / Services SIP User Agents Registrar Redirect Location Database SIP Proxy SIP Servers / Services REGISTER “Here I am” INVITE “I want to talk to another UA” Proxied INVITE “I’ll handle it for you” “Where is this name/phone#?” 3xx Redirection “They moved, try this address” SIP User Agents SIP-GW http://www.cisco.com/