Session Initiated Protocol (SIP): A Five-Function Protocol

Similar documents
Data Center Virtualization Q&A

Meeting the Challenges of an HA Architecture for IBM WebSphere SIP

SNMP: Simplified. White Paper by F5

Enabling Long Distance Live Migration with F5 and VMware vmotion

Cookies, Sessions, and Persistence

Deploying the BIG-IP LTM with IBM QRadar Logging

Archived. Deploying the BIG-IP LTM with IBM Cognos Insight. Deployment Guide Document version 1.0. What s inside: 2 Products and versions tested

Enhancing VMware Horizon View with F5 Solutions

Deploying the BIG-IP System with CA SiteMinder

Load Balancing 101: Nuts and Bolts

Webshells. Webshell Examples. How does a webshell attack work? Nir Zigler,

Prompta volumus denique eam ei, mel autem

F5 and Nuage Networks Partnership Overview for Enterprises

Archived. Configuring a single-tenant BIG-IP Virtual Edition in the Cloud. Deployment Guide Document Version: 1.0. What is F5 iapp?

Converting a Cisco ACE configuration file to F5 BIG IP Format

Deploying a Next-Generation IPS Infrastructure

Complying with PCI DSS 3.0

Server Virtualization Incentive Program

Unified Application Delivery

Maintain Your F5 Solution with Fast, Reliable Support

Geolocation and Application Delivery

Archived. h h Health monitoring of the Guardium S-TAP Collectors to ensure traffic is sent to a Collector that is actually up and available,

Deploying the BIG-IP System with Oracle Hyperion Applications

Large FSI DDoS Protection Reference Architecture

Deploying the BIG-IP System v11 with DNS Servers

Document version: 1.0 What's inside: Products and versions tested Important:

Addressing Security Loopholes of Third Party Browser Plug ins UPDATED FEBRUARY 2017

Deploying a Next-Generation IPS Infrastructure

Considerations for VoLTE Implementation

atl IP Telephone SIP Compatibility

Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems

APM Cookbook: Single Sign On (SSO) using Kerberos

F5 in AWS Part 3 Advanced Topologies and More on Highly Available Services

Optimizing NetApp SnapMirror Data Replication with F5 BIG-IP WAN Optimization Manager

Citrix Federated Authentication Service Integration with APM

VMware vcenter Site Recovery Manager

Load Balancing 101: Nuts and Bolts

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

The Programmable Network

Resource Provisioning Hardware Virtualization, Your Way

Managing the Migration to IPv6 Throughout the Service Provider Network White Paper

F5 icontrol. In this white paper, get an introduction to F5 icontrol service-enabled management API. F5 White Paper

The F5 Application Services Reference Architecture

Securing the Cloud. White Paper by Peter Silva

The Myth of Network Address Translation as Security

Session Initiation Protocol (SIP)

v.10 - Working the GTM Command Line Interface

Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System

DESIGN GUIDE. VMware NSX for vsphere (NSX-v) and F5 BIG-IP Design Guide

WHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN

BIG IQ Reporting for Subscription and ELA Programs

Simplifying Security for Mobile Networks

F5 Reference Architecture for Cisco ACI

Network Functions Virtualization - Everything Old Is New Again

BIG IP APM: Max Sessions Per User Enable users to terminate a specified session

Archived. Deploying the BIG-IP LTM with IBM Lotus inotes BIG-IP LTM , 10.1, 11.2, IBM Lotus inotes 8.5 (applies to 8.5.

Protecting Against Online Banking Fraud with F5

Improving VDI with Scalable Infrastructure

Distributing Applications for Disaster Planning and Availability

Deploying the BIG-IP LTM with Oracle JD Edwards EnterpriseOne

TSIN02 - Internetworking

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

TCP Optimization for Service Providers

Secure Mobile Access to Corporate Applications

Configuring Smart Card Authentication to BIG IP Management Interface

Multi-Tenancy Designs for the F5 High-Performance Services Fabric

Managing BIG-IP Devices with HP and Microsoft Network Management Solutions

The F5 Intelligent DNS Scale Reference Architecture

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos

Application Notes for Zeacom Communications Center with Avaya IP Office 9.0 Issue 1.0

One Time Passwords via an SMS Gateway with BIG IP Access Policy Manager

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

Optimize and Accelerate Your Mission- Critical Applications across the WAN

Protect Against Evolving DDoS Threats: The Case for Hybrid

The Session Initiation Protocol

Transporting Voice by Using IP

F5 iapps: Moving Application Delivery Beyond the Network

Vulnerability Assessment with Application Security

Application Notes for Enghouse Interactive Communications Center 2016 with Avaya IP Office 9.1 Issue 1.0

Application Notes for Enghouse Interactive Communications Center 2016R2 with Avaya IP Office Server Edition 10.0 Issue 1.0

Introducing IBM Lotus Sametime 7.5 software.

Avaya one-x Mobile User Guide for Windows Mobile

Application Notes for Enghouse Interactive Communications Center 10.0 with Avaya IP Office Server Edition 10.1 Issue 1.0

Control and Optimize Your 4G LTE Network with Diameter

Avaya Solution & Interoperability Test Lab Application Notes for configuring Datatal AB Flexi with Avaya IP Office 500 V2 Standalone R Issue 1.

Avaya Converged Office 2007 User Guide Microsoft Office Communications Server 2007

Creating a Hybrid ADN Architecture with both Virtual and Physical ADCs

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

Application Notes for Configuring SIP Trunking between the Comdasys Mobile Convergence Solution and an Avaya IP Office Telephony Solution Issue 1.

The Expectation of SSL Everywhere

Myths of Bandwidth Optimization

Enabling Flexibility with Intelligent File Virtualization

Application Notes for Enghouse Interactive Communications Center 10.1 with Avaya IP Office Server Edition 11 Issue 1.0

USER GUIDE Cisco Unified IP Phone Guide 3951 (SIP) User Guide for Cisco Unified Communications Manager Express 4.1

Abstract. Avaya Solution & Interoperability Test Lab

Data Sheet Instant Connect Mobile Client When your business is on the line, Instant Connect is here for your most critical communications needs. Welco

Automating the Data Center

Abstract. Avaya Solution & Interoperability Test Lab

Real Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport:

X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication

Transcription:

Session Initiated Protocol (SIP): A Five-Function Protocol SIP is an application-layer control protocol that can establish, modify, and terminate multimedia sessions (conferences) such as Internet telephony calls. SIP can also invite participants to already existing sessions, such as multicast conferences. Media can be added to (and removed from) an existing session. SIP transparently supports name mapping and redirection services, which supports personal mobility-users can maintain a single externally visible identifier regardless of their network location. White Paper by Paul Stalvig

Introduction SIP is an application-layer control protocol that can establish, modify, and terminate multimedia sessions (conferences) such as Internet telephony calls. SIP can also invite participants to already existing sessions, such as multicast conferences. Media can be added to (and removed from) an existing session. SIP transparently supports name mapping and redirection services, which supports personal mobility-users can maintain a single externally visible identifier regardless of their network location. Rosenberg, J., et al. (2002, June). RFC 3261 - SIP: Session Initiation Protocol. Internet RFC/STD/FYI/BCP Archives: http://www.faqs.org/rfcs/rfc3261.html "SIP, SIP, SIP" that's all we hear lately. Why? Simply put, the Session Initiated Protocol (SIP) is the means to an end, bringing about the convergence of communications. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. Enterprises have worked for many years to provide triple-play voice, video, and data services. The enterprise has grown from data services and is working towards adding voice and video services over the network. Meanwhile, the telecommunications industry has grown from providing voice, then video, and now data services. As telecommunications migrates toward being able to provide comprehensive IP services, a standard method of providing sessions is needed. Many protocols came before SIP, such as H.323. While H.323 provided an all-in-one solution, it was not flexible enough to provide for much beyond voice services. SIP also brings Web 2.0 concepts into fruition, but in a completely different manner. SIP is a primitive in that it does not provide services; it provides a conduit for 1

SIP is a primitive in that it does not provide services; it provides a conduit for services. For example, consider SIP a regular telephone line. The telephone line doesn't provide a service; it provides the ability to connect services. For example, we can talk choose a language, use a modem for data, or even pump the modem full of multimedia services. As long as the end-points (users) agree on what is being sent and how to view, listen, and so on, SIP can provide the session. SIP is a component of a complete multimedia architecture, and relies on other Internet Engineering Task Force (IETF) protocols. The SIP typically will use the Real- Time Session Protocol (RTSP) to provide transportation and quality of service (QoS) feedback for streaming media. Other standardized protocols control access to the public-switched telephone network, as well as describing multimedia sessions. While SIP uses these protocols, it is not tied to them if a better solution arises. This is one of the great things about SIP over its predecessor protocols (H.323); it does not have to be redefined to move onto something better. The key to SIP is that it provides only five functions: user location, user availability, user capabilities, session setup, and session management. That is all SIP does. That being said, SIP is flexible and open enough to allow developers to build their own "hooks" into SIP. This flexibility has given SIP an advantage over other "telecommunications protocols," and is why many enterprises are eager to develop, implement, and use SIP. SIP in a Nutshell SIP is responsible for user location, availability, capabilities, and session setup and management. SIP does not determine what services are being sent back and forth, nor does it affect how information is passed. Whether it uses radio waves, wirednetworks, satellites, etc., SIP only needs to be able to communicate. SIP is a textbased protocol, but also carries a lot of non-text information. Also, SIP uses request/response transactions. The "session," however, is not a maintained connection as many enterprises have come to think of sessions. SIP works between the session and application layers of the OSI model and is not confined to any one IP version. This means that it can work in and between IPv4 and IPv6 models. With the desire to keep SIP as flexible as possible, most of SIP's message and header field syntax is derived from the HTTP/1.1 specification, but is not tied to the HTTP/1.1 protocol. SIP Functionality 2

SIP Functionality Exactly what does SIP do? SIP provides the set-up/establishing, tying together, and tear-down/ terminating of multimedia communications. SIP does this by providing five different functions: User Location SIP determines user locations by a registration process. When a soft-phone is activated on a laptop, it sends out a registration to the SIP server announcing availability to the communications network. Voice over-ip (VoIP) phones, cellular phones, or even complete teleconferencing systems can be registered as well. Depending on the registration point chosen, there may be several different locations registered simultaneously. User Availability User availability is simply a method of determining whether or not a user would be willing to answer a request to communicate. If you "call" and no one answers, SIP determines that a user is not available. A user can have several locations registered, but might only accept incoming communications on one device. If that is not answered, it transfers to another device, or transfers the call to another application, such as voicemail. User Capabilities With all the various different methods and standards of multimedia communications, something is needed to check for compatibility between the communications and the users' capabilities. For example, if a user has an IP phone on their desk, a whiteboard conference via that device would not work. This function also determines which encryption/decryption methods a user can support. Session Setup SIP establishes the session parameter for both ends of the communications more specifically, where one person calls and the other answers. SIP provides the means to setup and/or establish communications. Session Management 3

Session Management This function provides the greatest amount of user awe. Provided a device is capable, a user could transfer from one device to another such as from an IPbased phone to a laptop without causing a noticeable impact. A user's overall capabilities would change such as being able to start new applications such as white-board sharing perhaps affecting the voice quality temporarily as SIP reevaluates and modifies the communications streams to return the voice quality. With SIP session management, a user can also change a session by making it a conference call, changing a telephone call to a video conference, or opening an inhouse developed application. And finally, SIP terminates the communications. Although SIP has five functions, it is currently easier to think of SIP as the setup, management, and tear down of IP-based communications. The user location and capabilities functions could easily become absorbed into the session setup function. SIP maintains the distinct five functions to remain open and provide for an unknown future. Summary The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP provides five functions, uses a layered approach that gives it flexibility, and has an openness that enables new applications to utilize it. SIP's open nature guarantees its large presence in IP-based multimedia communications architectures. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com Americas info@f5.com Asia-Pacific apacinfo@f5.com Europe/Middle-East/Africa emeainfo@f5.com Japan f5j-info@f5.com 2015 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 0113 4