Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010128023 | TK5105.55 S56 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010128024 | TK5105.55 S56 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
--Henning Schulzrinne, Professor, Columbia University
Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust technology, SIP today is fully capable of supporting the communication systems that power our twenty-first century work and life.
This second edition handbook has been revamped to cover the newest standards, services, and products. You'll find the latest on SIP usage beyond VoIP, including Presence, instant messaging (IM), mobility, and emergency services, as well as peer-to-peer SIP applications, quality-of-service, and security issues--everything you need to build and deploy today's SIP services.
This book will help you
* Work with SIP in Presence and event-based communications
* Handle SIP-based application-level mobility issues
* Develop applications to facilitate communications access for users with disabilities
* Set up Internet-based emergency services
* Explore how peer-to-peer SIP systems may change VoIP
* Understand the critical importance of Internet transparency
* Identify relevant standards and specifications
* Handle potential quality-of-service and security problems
Author Notes
Alan B. Johnston holds a B.E.(Hons) in electrical and electronic engineering from the University of Melbourne, Australia and a Ph.D. in electrical engineering from Lehigh University.
Johnston is an advisory engineer at WorldCom and an adjunct at Washington University.
050
Table of Contents
Foreword | p. xxi |
Acknowledgments | p. xxiii |
Introduction | p. xxv |
Chapter 1 Introduction | p. 1 |
Problem: Too Many Public Networks | p. 1 |
Incompatible Enterprise Communications | p. 4 |
Network Consolidation: The Internet | p. 4 |
Voice over IP | p. 5 |
Presence-The Dial Tone for the Twenty-First Century? | p. 6 |
The Value Proposition of SIP | p. 6 |
SIP Is Not a Miracle Protocol | p. 6 |
The Short History of SIP | p. 7 |
References in This Book | p. 8 |
SIP Open Source Code and SIP Products | p. 9 |
References for Telephony | p. 10 |
Summary | p. 10 |
References | p. 10 |
Chapter 2 Internet Communications Enabled by SIP | p. 11 |
Internet Multimedia Protocols | p. 12 |
The Value of Signaling | p. 13 |
Protocols for Media Description, Media Transport, and other Multimedia Delivery | p. 14 |
Addressing | p. 15 |
SIP in a Nutshell | p. 15 |
SIP Capabilities | p. 17 |
Overview of Services Provided by SIP Servers | p. 18 |
Peer-to-Peer SIP (P2PSIP) | p. 19 |
Caller Preferences | p. 19 |
Mobility in the Wider Concept | p. 20 |
Global Telephone Number Portability | p. 20 |
SIP Application-Level Mobility | p. 20 |
Context-Aware Communications: Presence and IM | p. 21 |
SIP Presence | p. 21 |
Instant Messaging | p. 23 |
The Integration of Communications with Applications | p. 23 |
E-Commerce: Customer Relations Management | p. 23 |
Conferencing and Collaboration | p. 24 |
Telephony Call Control Services | p. 25 |
Intelligent Network Services Using SIP: ITU Services CS-1 and CS-2 | p. 25 |
SIP Service Creation-Telephony-Style | p. 26 |
ENUM | p. 27 |
SIP Interworking with ITU-T Protocols | p. 27 |
Mixed Internet-PSTN Services | p. 29 |
PSTN and INTerworking (PINT) | p. 29 |
SPIRITS | p. 29 |
TRIP | p. 29 |
SIP Security | p. 31 |
SIP Accessibility to Communications for the Hearing and Speech Disabled | p. 31 |
SIP Orphans | p. 32 |
Commercial SIP Products | p. 32 |
What SIP Does Not Do | p. 33 |
Divergent Views on the Network | p. 34 |
Summary | p. 35 |
References | p. 35 |
Chapter 3 Architectural Principles of the Internet | p. 39 |
Telecom Architecture | p. 39 |
Internet Architecture | p. 42 |
The Internet Backbone Architecture | p. 44 |
The Internet Standards Process | p. 48 |
Protocols and Application Programming Interfaces | p. 49 |
Is XML the Presentation Layer of the Internet Protocol Architecture? | p. 50 |
Middle-Age Symptoms of the Internet | p. 50 |
Fighting Complexity | p. 51 |
Summary | p. 52 |
References | p. 52 |
Chapter 4 DNS and ENUM | p. 53 |
Introduction | p. 53 |
Addressing on the Internet | p. 54 |
The Universal Resource Identifier (URI) | p. 54 |
mailto | p. 55 |
The Universal Resource Locator (URL) | p. 55 |
Tel URI | p. 56 |
The phone-context | p. 56 |
SIP URI | p. 57 |
IANA ENUM Service Registrations | p. 58 |
The Domain Name System | p. 58 |
Delegation | p. 59 |
Caching | p. 59 |
A Partial DNS Glossary | p. 60 |
DNS and ENUM Usage Example | p. 62 |
Finding an Outgoing SIP Server | p. 63 |
Finding an Incoming SIP Server in the ENUM Case | p. 64 |
Call Setup Delay | p. 67 |
DNS-Based Routing Service Using SIP | p. 67 |
SIP URI or Telephone Number? | p. 67 |
The ENUM Functional Architecture | p. 69 |
ENUM and Number Portability | p. 71 |
Implementation Issues | p. 71 |
DNS and SIP User Preferences | p. 72 |
Application Scenarios for SIP Service Using ENUM | p. 73 |
PBX Enterprise Voice Network | p. 74 |
Enterprise System with IP Communications | p. 74 |
Residential User with ENUM Service | p. 76 |
Miscellaneous: ENUM Lookup of the Display Name | p. 76 |
DNS and Security | p. 77 |
Impersonation | p. 77 |
Eavesdropping | p. 77 |
Data Tampering | p. 78 |
Malicious Redirection | p. 78 |
Denial of Service | p. 78 |
Summary | p. 79 |
References | p. 79 |
Chapter 5 Real-Time Internet Multimedia | p. 81 |
Introduction | p. 81 |
Freshening Up on IP | p. 83 |
Multicast Protocols | p. 85 |
Multicast Address Allocation | p. 85 |
Application-Level Multicast | p. 86 |
Transport Protocols | p. 86 |
IP Network Layer Services | p. 87 |
Differentiated Services | p. 88 |
Resource Reservation | p. 88 |
Integrated Services and DiffServ Networks | p. 89 |
Multiprotocol Label Switching | p. 89 |
Media and Data Formats | p. 90 |
Media Transport Using RTP | p. 91 |
RTP Payloads and Payload Format Specifications | p. 92 |
Multimedia Server Recording and Playback Control | p. 93 |
Session Description | p. 93 |
Session Announcements | p. 93 |
Session Invitation | p. 93 |
Authentication and Key Distribution | p. 94 |
Summary | p. 94 |
References | p. 94 |
Chapter 6 SIP Overview | p. 97 |
What Makes SIP Special | p. 97 |
SIP Enabled Network | p. 98 |
Watching How Sausages Are Being Made | p. 101 |
What SIP Is Not | p. 102 |
Introduction to SIP | p. 102 |
Elements of a SIP Network | p. 106 |
User Agents | p. 106 |
Servers | p. 106 |
Location Services | p. 107 |
SIP Functions | p. 107 |
Address Resolution | p. 108 |
Session-Related Functions | p. 110 |
Session Setup | p. 110 |
Media Negotiation | p. 111 |
Session Modification | p. 114 |
Session Termination and Cancellation | p. 116 |
Mid-Call Signaling | p. 117 |
Call Control | p. 118 |
Preconditions Call Setup | p. 121 |
Nonsession-Related Functions | p. 123 |
Mobility | p. 124 |
Message Transport | p. 126 |
Event Subscription and Notification | p. 127 |
Presence Publication | p. 128 |
Authentication Challenges | p. 128 |
Extensibility | p. 130 |
Summary | p. 132 |
References | p. 132 |
Chapter 7 SIP Service Creation | p. 135 |
Services in SIP | p. 135 |
Service Example | p. 136 |
Server Implementation | p. 136 |
Called User Agent Implementation | p. 137 |
Calling User Agent Implementation | p. 138 |
Comparison | p. 140 |
New Methods and Headers | p. 141 |
Service Creation Options | p. 142 |
Call Processing Language | p. 142 |
Introduction to CPL | p. 142 |
Example of CPL Scripts | p. 146 |
SIP Common Gateway Interface | p. 147 |
SIP Application Programming Interfaces | p. 148 |
SIP Servlets | p. 149 |
JAIN | p. 149 |
SIP and VoiceXML | p. 149 |
Summary | p. 150 |
References | p. 150 |
Chapter 8 User Preferences | p. 153 |
Introduction | p. 153 |
Preferences of Caller | p. 154 |
Example for Contact | p. 156 |
Example for Accept-Contact | p. 156 |
Example for Reject-Contact | p. 156 |
Preferences of the Called Party | p. 157 |
Server Support for User Preferences and for Policies | p. 157 |
Summary | p. 157 |
References | p. 158 |
Chapter 9 SIP Security | p. 159 |
Threats | p. 159 |
Session Setup | p. 160 |
Presence and IM | p. 161 |
Security Mechanisms | p. 162 |
Authentication | p. 162 |
Confidentiality | p. 163 |
Secure SIP URI Scheme | p. 164 |
Integrity | p. 165 |
Identity | p. 165 |
Media Security | p. 166 |
SRTP | p. 166 |
MIKEY | p. 167 |
SDP Security Descriptions | p. 167 |
New Directions | p. 168 |
DTLS | p. 169 |
ZRTP | p. 169 |
Summary | p. 169 |
References | p. 170 |
Chapter 10 NAT and Firewall Traversal | p. 173 |
Network Address Translators | p. 174 |
Firewalls | p. 177 |
STUN, TURN, and ICE | p. 179 |
Application Layer Gateways | p. 180 |
Privacy Considerations | p. 183 |
Summary | p. 184 |
References | p. 184 |
Chapter 11 SIP Telephony | p. 185 |
Basic Telephony Services | p. 185 |
SIP and PSTN Interworking | p. 185 |
Gateway Location and Routing | p. 186 |
SIP/PSTN Protocol Interworking | p. 187 |
Types of Gateways | p. 188 |
SIP and Early Media | p. 188 |
SIP Telephony and ISUP Tunneling | p. 190 |
Enhanced Telephony Services | p. 196 |
Call Control Services and Third-Party Call Control | p. 199 |
Problem Statement | p. 199 |
The REFER Method | p. 201 |
SIP Third-Party Call Control | p. 202 |
Basic Third-Party Call Control | p. 203 |
Security for Third-Party Call Control | p. 203 |
Peer-to-Peer Third-Party Call Control | p. 205 |
Summary | p. 206 |
References | p. 207 |
Chapter 12 Voicemail and Universal Messaging | p. 209 |
Problem Statement for Unified Messaging | p. 209 |
Architecture and Operation | p. 211 |
RTSP-Enabled Voice Message Retrieval | p. 212 |
Depositing of Voice Messages | p. 214 |
Notification for Waiting Messages | p. 217 |
Simple Message Notification Format | p. 217 |
Rich Message Notification Format | p. 220 |
Retrieval of Messages | p. 221 |
Summary | p. 221 |
References | p. 221 |
Chapter 13 Presence and Instant Messaging | p. 223 |
The Potential of SIP Presence, Events, and IM | p. 224 |
The Evolution of IM and Presence | p. 225 |
The IETF Model for Presence and IM | p. 226 |
Client Server and Peer-to-Peer Presence and IM | p. 228 |
SIP Event-Based Communications and Applications | p. 229 |
Presence Event Package | p. 231 |
Presence Information Data Format | p. 233 |
The Data Model for Presence | p. 235 |
Indication of Message Composition for IM | p. 236 |
Rich Presence Information | p. 236 |
SIP Extensions for Instant Messaging | p. 239 |
Summary | p. 241 |
References | p. 242 |
Chapter 14 SIP Conferencing | p. 245 |
Introduction | p. 245 |
SIP Conferencing Models | p. 246 |
Ad Hoc and Scheduled Conferences | p. 249 |
Changing the Nature of a Conference | p. 249 |
Centralized Conferencing | p. 251 |
Summary | p. 251 |
References | p. 251 |
Chapter 15 SIP Application Level Mobility | p. 253 |
Mobility in Different Protocol Layers | p. 254 |
Dimensions of Mobility | p. 255 |
Examples of SIP Application-Layer Mobility | p. 256 |
SIP Network-Based Fixed-Mobile Convergence | p. 261 |
SIP Device-Based Fixed-Mobile Convergence | p. 263 |
SIP Application-Layer Mobility and Mobile IP | p. 263 |
Multimodal Mobile Device Technology and Issues | p. 265 |
Network Control versus User Control of Mobility | p. 266 |
IEEE 802.21 Media-Independent Handover (MIH) | p. 267 |
Network Selection Issues | p. 269 |
Summary | p. 270 |
References | p. 270 |
Chapter 16 Emergency and Preemption Communication Services | p. 273 |
Requirements | p. 274 |
Location Information | p. 275 |
Types of Location Information | p. 275 |
Sources of Location Information | p. 275 |
DNS-Based Location Information | p. 275 |
Internet-Based Emergency Calling | p. 277 |
Identifying an Internet Emergency Call: The SOS URI | p. 278 |
Internet Emergency Call Routing | p. 278 |
Security for Emergency Call Services | p. 279 |
Using the PSTN for VoIP Emergency Calls | p. 280 |
Emergency Communication Services | p. 281 |
Emergency Call Preemption Using SIP | p. 282 |
Linking SIP Preemption to IP Network and Link Layer Preemption | p. 284 |
Summary | p. 285 |
References | p. 285 |
Chapter 17 Accessibility for the Disabled | p. 287 |
About Accessibility | p. 287 |
Accessibility on Legacy Networks and on the Internet | p. 288 |
Requirements for Accessibility | p. 289 |
Text over IP (ToIP) | p. 290 |
Performance Metrics for ToIP | p. 293 |
Transcoding Services | p. 294 |
Transcoding Scenarios | p. 294 |
Call Control Models for Transcoding Services | p. 296 |
Summary | p. 298 |
References | p. 299 |
Chapter 18 Quality of Service for Real-Time Internet Communications | p. 301 |
Voice Quality Metrics | p. 303 |
Delay Limits for Voice | p. 303 |
Burst vs. Average Packet Loss | p. 304 |
Acoustics and the Network | p. 304 |
Internet Codecs | p. 305 |
Codecs in Wireless Networks and Transcoding | p. 307 |
Codec Bandwidth | p. 307 |
The Endpoint Quality for Voice | p. 308 |
The Internet Performance | p. 308 |
Concerns Regarding Congestion Control | p. 309 |
Internet Traffic Statistics: Voice Is Negligible | p. 309 |
A Summary of Internet QoS Technologies | p. 311 |
Best Effort Is for the Best Reasons | p. 313 |
Monitoring QoS for Real-Time Communications | p. 314 |
Summary | p. 315 |
References | p. 315 |
Chapter 19 SIP Component Services | p. 317 |
Master/Slave VoIP Systems | p. 318 |
IP Telephony Gateways | p. 320 |
The Converged Applications Environment | p. 323 |
The Control of Service Context | p. 326 |
Voicemail | p. 328 |
Collecting DTMF Digits | p. 330 |
Interactive Voice Response System | p. 333 |
Scheduled Conference Service | p. 335 |
Summary | p. 337 |
References | p. 337 |
Chapter 20 Peer-to-Peer SIP | p. 339 |
Definitions for P2P Networks | p. 340 |
Overlay Networks | p. 340 |
Peer-to-Peer Networks | p. 341 |
Distributed Hash Tables (DHTs) | p. 342 |
Characteristics of P2P Computing | p. 344 |
Security of P2P Networks | p. 344 |
The Chord Protocol | p. 345 |
P2P SIP | p. 346 |
CS SIP Model | p. 347 |
P2P SIP Model | p. 348 |
Use Cases for P2P SIP | p. 348 |
Disruption of the VoIP Infrastructure Model | p. 349 |
Summary | p. 350 |
References | p. 351 |
Chapter 21 Conclusions and Future Directions | p. 353 |
Short Term Challenges | p. 355 |
Future Services: The Internet Is the Service | p. 355 |
Still to Develop: Peer-to-Peer SIP Standards | p. 355 |
Prediction: The Long Road Ahead | p. 356 |
Summary | p. 356 |
References | p. 356 |
Index | p. 357 |