Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010170290 | TK5105.55 R87 2008 | Open Access Book | Book | Searching... |
Searching... | 30000010170136 | TK5105.55 R87 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Build a next-generation telecommunications infrastructure
Consolidate divergent networks into one seamless, high-performance communications landscape using cutting-edge SIP technology, tools, and techniques. Session Initiation Protocol (SIP): Controlling Convergent Networks explains how to deliver Internet phone calls, IMs, video streams, and teleconferences across legacy, wireless, and wireline networks. Learn how to manage SIP sessions, build layers and proxies, interpret control codes, set up gateways, and comply with IETF and 3GPP standards. You'll also get details on using the latest methods, maximizing QoS, and implementing security measures.
Initiate, modify, and terminate IETF-compliant SIP sessions Construct SIP messages, requests, proxies, functions, and layers Interconnect WiFi, WiMax, VoIP, and wireline networks Incorporate TDM and SS7 systems using media and signaling gateways Determine user locations with REGISTER and presence techniques Augment functionality using RFCs and packet cable extensions Prevent hijacking, tampering, DoS, DDoS, and BOTS attacks Implement reliable authentication, encryption, and intrusion detection policiesAuthor Notes
Travis Russell is a senior manager at Tekelec with more than 25 years of experience in data and voice networks
Table of Contents
Acknowledgments | p. xiii |
Introduction | p. xv |
Chapter 1 Architecture of a SIP Network | p. 1 |
The Traditional Voice Network | p. 2 |
Wireline Network Architecture | p. 2 |
Wireless Network Architecture | p. 5 |
Network Elements in a Voice over IP Network | p. 7 |
Media Gateway (MG) | p. 9 |
Media Gateway Control Function (MGCF) | p. 10 |
Signaling Gateway | p. 10 |
Application Servers (ASs) | p. 11 |
The Domain Name System (DNS) | p. 11 |
Electronic Numbering (ENUM) | p. 12 |
SIP-Specific Entities | p. 13 |
User Agents (UAs) | p. 14 |
Proxy Servers | p. 16 |
Redirect Servers | p. 18 |
Registrars | p. 19 |
Location Servers | p. 19 |
Chapter 2 Structure of the SIP Protocol | p. 21 |
SIP Messages and Formats | p. 21 |
Concept of a Dialog | p. 23 |
Requests | p. 25 |
Responses | p. 26 |
Header Fields | p. 28 |
SIP Identities | p. 42 |
Private User Identity | p. 44 |
Public User Identity | p. 45 |
Session Description Protocol (SDP) | p. 46 |
Session Descriptions | p. 48 |
Time Descriptions | p. 50 |
Media Descriptions | p. 51 |
Attributes | p. 52 |
Chapter 3 SIP Status Codes | p. 55 |
1xx Provisional Codes | p. 57 |
2xx Successful Status Codes | p. 59 |
3xx Redirection Status Codes | p. 60 |
4xx Client Failure Status Codes | p. 61 |
5xx Server Failure Status Codes | p. 69 |
6xx Global Failure Status Codes | p. 70 |
Chapter 4 Registration Procedures in a SIP Network | p. 73 |
Basic Registration | p. 74 |
Event Notification | p. 77 |
Message Waiting Indication (MWI) | p. 77 |
Interworking with the PSTN | p. 79 |
Chapter 5 Establishing a Session in SIP | p. 91 |
Accessing the Network | p. 92 |
Initiating a Dialog | p. 93 |
Client Request | p. 97 |
Server Response | p. 99 |
Emergency Session Establishment | p. 101 |
SIP Routing | p. 102 |
Loose Routing | p. 103 |
Strict Routing | p. 108 |
SIP Session Modification | p. 111 |
SIP Session Termination | p. 112 |
Chapter 6 Extending SIP to Support New Functions | p. 115 |
The Concept of SIP Extensions | p. 116 |
How Extensions are Documented | p. 117 |
How Extensions are Treated | p. 117 |
Some Examples of Extensions | p. 118 |
P-Access-Network-Info | p. 119 |
P-Answer-State | p. 120 |
P-Asserted-Identity | p. 121 |
P-Associated-URI | p. 121 |
P-Called-Party-ID | p. 122 |
P-Charging-Function-Addresses | p. 122 |
P-Charging-Vector | p. 123 |
P-Early Media | p. 124 |
P-Media-Authorization | p. 125 |
P-Preferred-Identity | p. 125 |
P-Profile-Key | p. 126 |
P-User-Database | p. 126 |
P-Visited-Network-ID Header | p. 127 |
Packet Cable Extensions | p. 128 |
P-DCS-Trace-Party-ID | p. 128 |
P-DCS-OSPS | p. 128 |
P-DCS-Billing-Info | p. 129 |
P-DCS-LAES | p. 130 |
P-DCS-Redirect | p. 131 |
Chapter 7 Security in a SIP Network | p. 133 |
Types of Network Attacks | p. 134 |
Registration Hijacking | p. 135 |
Session Hijacking | p. 136 |
Impersonating a Server | p. 137 |
Tampering with Message Bodies | p. 138 |
Tearing Down Sessions | p. 138 |
Denial of Service and Amplification | p. 139 |
Bots and DDoS Attacks | p. 140 |
Security Measures | p. 141 |
Password and Access Controls | p. 145 |
Encryption | p. 146 |
Authentication and Authorization | p. 149 |
Strict Routing | p. 150 |
Security Solutions | p. 151 |
Intrusion Detection | p. 152 |
Intrusion Protection | p. 156 |
Appendix A SIP-Related RFCs | p. 159 |
IETF SIP Requests for Comments (RFCs) | p. 159 |
Appendix B Methods and Parameters | p. 163 |
ACK Method | p. 164 |
BYE Method | p. 165 |
CANCEL Method | p. 170 |
INVITE Method | p. 172 |
MESSAGE Method | p. 178 |
NOTIFY Method | p. 182 |
OPTIONS Method | p. 186 |
REGISTER Method | p. 191 |
SUBSCRIBE Method | p. 196 |
UPDATE Method | p. 201 |
Appendix C Methods and Parameters from a Proxy Perspective | p. 207 |
ACK Method | p. 208 |
BYE Method | p. 209 |
CANCEL Method | p. 213 |
INVITE Method | p. 215 |
MESSAGE Method | p. 220 |
NOTIFY Method | p. 224 |
OPTIONS Method | p. 229 |
REGISTER Method | p. 233 |
SUBSCRIBE Method | p. 238 |
UPDATE Method | p. 243 |
Bibliography | p. 247 |
Index | p. 251 |