You are on page 1of 17

SIP

SoftSwitch, Chapter 5 p88

SIP

SIP is a signaling protocol. It uses a text-based syntax similar to the Hypertext Transfer Protocol (HTTP) like that used in web addresses. Programs that are designed for the parsing of HTTP can be adapted easily for use with SIP. SIP addresses, known as SIP uniform resource locators (URLs) take the form of web addresses. A web address can be the equivalent of a telephone number in an SIP network. In addition, PSTN phone numbers can be incorporated into an SIP address for interfacing with the PSTN. An email address is portable.

Development of SIP

SIP was designed as a part of the Internet Engineering Task Force (IETF) multimedia data and control architecture. It is designed to interwork with other IETF protocols such as the Session Description Protocol (SDP), RTP, and the Session Announcement Protocol (SAP). It is described in the IETFs RFC 2543. Many in the VoIP and softswitch industry believe that SIP will replace H.323 as the standard signaling protocol for VoIP.

SIP is a signaling protocol and RTP transports the conversation protocol

SIP Architecture

SIP is focused on two classes of network entities: clients (also called user agents [UAs]) and servers. VoIP calls on SIP to originate at a client and terminate at a server. Four types of SIP servers exist.

user agent server (UAS) Redirect server proxy server a registrar.

SIP UA server to UA server call

SIP call using a proxy server

Registrar

A registrar is a server that accepts SIP REGISTER requests. SIP includes the concept of user registration where a user tells the network that he is available at a given address. This registration occurs by issuing a REGISTER request by the user to the registrar. A registrar is often combined with a proxy or redirect server. Practical implementations often combine the UAC and UAS with registrars with either proxy servers or redirection servers.

Location Servers

Location servers are not SIP entities but are an important part of SIP architecture. A location server stores and returns possible locations for users. It can make use of information from registrars or from other databases. Most registrars upload location updates to a location server upon receipt. SIP is not used between location servers and SIP servers. Some location servers use the Lightweight Directory Access Protocol (LDAP, see IETF RFC 1777) to communicate with SIP servers.4

SIP gateways in long-distance bypass and enterprise telephony

Next class: Comparison of SIP and H323 Mid 2 will be on 31 March at the class time

Telephone Number Mapping (ENUM)

The IETF standard that defines address mapping among phone numbers and Internet devices. It provides a way to reach multiple communication services via a single phone number. ENUM provides a process for converting a phone number into a DNS address (URL). It translates e.164 telephone numbers into Internet addresses.

E.164

E.164 is an ITU-T recommendation which defines the international public telecommunication numbering plan used in the PSTN and some other data networks. It also defines the format of telephone numbers. E.164 numbers can have a maximum of fifteen digits and are usually written with a + prefix. To actually dial such numbers from a normal fixed line phone, the appropriate international call prefix must be used.
http://www.e164.org/

IPv6

The previous discussion assumed the use of Internet Protocol version 4 (IPv4), the predominant version of IP in use today. A new version, IPv6, is now coming on the market. The explosion of Internet addresses necessitates the deployment of IPv6. IPv6 makes possible infinitely more addresses than IPv4.

SoftSwitch p.85

Enhancements offered by IPv6 over IPv4

Expanded address space Each address is allocated 128 bits instead of 32 bits in IPv4. Simplified header format This enables easier processing of IP datagrams. Improved support for headers and extensions This enables greater flexibility for the introduction of new options. Flow-labeling capability This enables the identification of traffic flows for real-time applications. Authentication and privacy Support for authentication, data integrity, and data confidentiality are supported at the IP level rather than through separate protocols or mechanisms above IP.

You might also like