SlideShare a Scribd company logo
1 of 12
PRESENTED BY
S.SANTHOSH
12G21D5830
ABSTRACT
 SIP provides for the seamless transmission of voice, fax, and data
across IP and traditional telephone networks.
 The IETF defines SIP as “a text- based protocol, similar to HTTP
and SMTP, for initiating interactive communication sessions between
users. Such sessions include voice, video, chat, interactive games,
and virtual reality.”
 The Session Initiation Protocol (SIP) is an Internet Engineering Task
Force (IETF) standard protocol for initiating an interactive user
session that involves multimedia elements such as video, voice, chat,
gaming, and virtual reality.
INTRODUCTION
 SIP is a request-response protocol, dealing with requests from clients
and responses from servers. Participants are identified by SIP URLs.
Requests can be sent through any transport protocol, such as UDP,
SCTP, or TCP.
 The protocol can also invite participants to unicast or
multicast sessions that do not necessarily involve the initiator.
Because the SIP supports name mapping and redirection services, it
makes it possible for users to initiate and receive communications
and services from any location, and for networks to identify the users
wherever they are.
APPLICATIONS
It has given rise to generation of new types of smart phone. With the
help of the technology now smart phones also support the video
conferencing.
 setting up voice-over-IP calls
 setting up multimedia conferences
 event notification (subscribe/notify) à IM and presence
 text and general messaging
 signaling transport
FUNCTIONALITY
 As the name implies the session initiation protocol is about initiation
interactive communications sessions between users. SIP also handles
termination and modifications of sessions as well.
 Locating the user – supports personals mobility
 Inviting the user for session
 Delivering the session description
 Terminate the session
ARCHITECTURE
WORKING PROCESS
 User Agents:
 User agent is an application which contains both a user agent client
and user agent server. A user agent client (UAC) is a client
application that initiates the SIP request. A user agent server (UAS)
is a server application that contacts the user when a SIP request is
received.
 proxy server:
 The Proxy Servers are application layer routers that forward SIP
request & responses.
Continution
 Redirect server:
 A redirect server is a server that accepts a SIP Requests & then return
the location of another SIP user agent & server where the user might
be found.
 Registrar server:
 A registrar is a server that accepts REGISTER requests. A registrarer
is typically co-located with a proxy or redirect server and offer
location services.
ADVANTAGES
 SIP is scalable, easy to implement, and requires less setup time than
its predecessor protocols.
 SIP can be used to modify any session in progress, a normal
telephone call session can be converted into a multi-party
videoconference.
 Users can join in the session no matter what kind of terminal he is
using or where he is located. The other person may be logged on to
Internet through a PC, or may be traveling with a cell phone.
DISADVANTAGES
 One SIP challenge is that SIP message contain information that
Client and/or server will like to keep private but SIP header as well
as message in the open and distributed architecture of VOIP systems
makes it difficult to keep this information confidential.
 When a SIP user is registering with SIP Registrar server the attacker
can hijack the registration.
 Two main reasons for this attack are: SIP messages being sent in
clear and no SIP message authentication built into the protocol
CONCLUSION
 SIP is now a days used for internet conferences, internet
multimedia, internet telephony calls at distance learning with
compatible session like voice, chat , traditional telephony
networks, voice, fax, interactive games etc.
 SIP become a standard IETF protocol for signaling in third –
generation mobile networking SIP runs on top of several
different transport protocols.
THANK YOU

More Related Content

What's hot

IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysischinmaypadhye1985
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7Alan Percy
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Fringe Division
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Cisco Canada
 

What's hot (20)

IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Ipv6
Ipv6Ipv6
Ipv6
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysis
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here...
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
Aboutsip - SIP Routing
Aboutsip - SIP RoutingAboutsip - SIP Routing
Aboutsip - SIP Routing
 

Viewers also liked

Sip & its application
Sip & its applicationSip & its application
Sip & its applicationPoulami Pal
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepguestad6e9e
 
SIP: Session Initiation Protocol
SIP: Session Initiation ProtocolSIP: Session Initiation Protocol
SIP: Session Initiation ProtocolLuis Nogales
 
Docfoc.com ngn - signaling & protocol analysis
Docfoc.com ngn - signaling & protocol analysisDocfoc.com ngn - signaling & protocol analysis
Docfoc.com ngn - signaling & protocol analysisRashid Khan
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010Voxeo Corp
 
WebRTC meetup barcelona 2017
WebRTC meetup barcelona 2017WebRTC meetup barcelona 2017
WebRTC meetup barcelona 2017Juan De Bravo
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overviewJohn Downing
 
AnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball NetworksAnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball NetworksEyeball Networks
 

Viewers also liked (20)

SIP - The Basics
SIP - The BasicsSIP - The Basics
SIP - The Basics
 
Sip & its application
Sip & its applicationSip & its application
Sip & its application
 
Take a sip of sip
Take a sip of sipTake a sip of sip
Take a sip of sip
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
 
Authetication ppt
Authetication pptAuthetication ppt
Authetication ppt
 
SIP: Session Initiation Protocol
SIP: Session Initiation ProtocolSIP: Session Initiation Protocol
SIP: Session Initiation Protocol
 
SOC Foundation
SOC FoundationSOC Foundation
SOC Foundation
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
IPv6 and SIP - Myth or Reality?
IPv6 and SIP - Myth or Reality?IPv6 and SIP - Myth or Reality?
IPv6 and SIP - Myth or Reality?
 
SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?
 
Docfoc.com ngn - signaling & protocol analysis
Docfoc.com ngn - signaling & protocol analysisDocfoc.com ngn - signaling & protocol analysis
Docfoc.com ngn - signaling & protocol analysis
 
ICE basic
ICE basicICE basic
ICE basic
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
Ice
IceIce
Ice
 
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
 
WebRTC meetup barcelona 2017
WebRTC meetup barcelona 2017WebRTC meetup barcelona 2017
WebRTC meetup barcelona 2017
 
Pixeom
PixeomPixeom
Pixeom
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
AnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball NetworksAnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball Networks
 

Similar to Session initiation-protocol

Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
Implementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolImplementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolIOSR Journals
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllersstefansayer
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
Energize your Unified Communications with SIP
Energize your Unified Communications with SIPEnergize your Unified Communications with SIP
Energize your Unified Communications with SIPXO Communications
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
Reliance jio 4G & Volte
Reliance jio 4G & VolteReliance jio 4G & Volte
Reliance jio 4G & VolteMarlabs
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia Systemmanymbaboy
 
76 s201919
76 s20191976 s201919
76 s201919IJRAT
 

Similar to Session initiation-protocol (20)

Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Implementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation ProtocolImplementing Automatic Callback Using Session Initiation Protocol
Implementing Automatic Callback Using Session Initiation Protocol
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
VoIP
VoIPVoIP
VoIP
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Sip
SipSip
Sip
 
Energize your Unified Communications with SIP
Energize your Unified Communications with SIPEnergize your Unified Communications with SIP
Energize your Unified Communications with SIP
 
Aarti sip
Aarti sipAarti sip
Aarti sip
 
Aarti Sip
Aarti SipAarti Sip
Aarti Sip
 
Voip security
Voip securityVoip security
Voip security
 
SIP PRIMER
SIP PRIMERSIP PRIMER
SIP PRIMER
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Reliance jio 4G & Volte
Reliance jio 4G & VolteReliance jio 4G & Volte
Reliance jio 4G & Volte
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia System
 
76 s201919
76 s20191976 s201919
76 s201919
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Session initiation-protocol

  • 2. ABSTRACT  SIP provides for the seamless transmission of voice, fax, and data across IP and traditional telephone networks.  The IETF defines SIP as “a text- based protocol, similar to HTTP and SMTP, for initiating interactive communication sessions between users. Such sessions include voice, video, chat, interactive games, and virtual reality.”  The Session Initiation Protocol (SIP) is an Internet Engineering Task Force (IETF) standard protocol for initiating an interactive user session that involves multimedia elements such as video, voice, chat, gaming, and virtual reality.
  • 3. INTRODUCTION  SIP is a request-response protocol, dealing with requests from clients and responses from servers. Participants are identified by SIP URLs. Requests can be sent through any transport protocol, such as UDP, SCTP, or TCP.  The protocol can also invite participants to unicast or multicast sessions that do not necessarily involve the initiator. Because the SIP supports name mapping and redirection services, it makes it possible for users to initiate and receive communications and services from any location, and for networks to identify the users wherever they are.
  • 4. APPLICATIONS It has given rise to generation of new types of smart phone. With the help of the technology now smart phones also support the video conferencing.  setting up voice-over-IP calls  setting up multimedia conferences  event notification (subscribe/notify) à IM and presence  text and general messaging  signaling transport
  • 5. FUNCTIONALITY  As the name implies the session initiation protocol is about initiation interactive communications sessions between users. SIP also handles termination and modifications of sessions as well.  Locating the user – supports personals mobility  Inviting the user for session  Delivering the session description  Terminate the session
  • 7. WORKING PROCESS  User Agents:  User agent is an application which contains both a user agent client and user agent server. A user agent client (UAC) is a client application that initiates the SIP request. A user agent server (UAS) is a server application that contacts the user when a SIP request is received.  proxy server:  The Proxy Servers are application layer routers that forward SIP request & responses.
  • 8. Continution  Redirect server:  A redirect server is a server that accepts a SIP Requests & then return the location of another SIP user agent & server where the user might be found.  Registrar server:  A registrar is a server that accepts REGISTER requests. A registrarer is typically co-located with a proxy or redirect server and offer location services.
  • 9. ADVANTAGES  SIP is scalable, easy to implement, and requires less setup time than its predecessor protocols.  SIP can be used to modify any session in progress, a normal telephone call session can be converted into a multi-party videoconference.  Users can join in the session no matter what kind of terminal he is using or where he is located. The other person may be logged on to Internet through a PC, or may be traveling with a cell phone.
  • 10. DISADVANTAGES  One SIP challenge is that SIP message contain information that Client and/or server will like to keep private but SIP header as well as message in the open and distributed architecture of VOIP systems makes it difficult to keep this information confidential.  When a SIP user is registering with SIP Registrar server the attacker can hijack the registration.  Two main reasons for this attack are: SIP messages being sent in clear and no SIP message authentication built into the protocol
  • 11. CONCLUSION  SIP is now a days used for internet conferences, internet multimedia, internet telephony calls at distance learning with compatible session like voice, chat , traditional telephony networks, voice, fax, interactive games etc.  SIP become a standard IETF protocol for signaling in third – generation mobile networking SIP runs on top of several different transport protocols.