Cover image for Session Initiation Protocol (SIP) : controlling convergent networks
Title:
Session Initiation Protocol (SIP) : controlling convergent networks
Personal Author:
Series:
McGraw-Hill communications
Publication Information:
New York, NY : McGraw-Hill, 2008
Physical Description:
xvii, 264 p. : ill. ; 25 cm.
ISBN:
9780071488525

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010170290 TK5105.55 R87 2008 Open Access Book Book
Searching...
Searching...
30000010170136 TK5105.55 R87 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Build a next-generation telecommunications infrastructure

Consolidate divergent networks into one seamless, high-performance communications landscape using cutting-edge SIP technology, tools, and techniques. Session Initiation Protocol (SIP): Controlling Convergent Networks explains how to deliver Internet phone calls, IMs, video streams, and teleconferences across legacy, wireless, and wireline networks. Learn how to manage SIP sessions, build layers and proxies, interpret control codes, set up gateways, and comply with IETF and 3GPP standards. You'll also get details on using the latest methods, maximizing QoS, and implementing security measures.

Initiate, modify, and terminate IETF-compliant SIP sessions Construct SIP messages, requests, proxies, functions, and layers Interconnect WiFi, WiMax, VoIP, and wireline networks Incorporate TDM and SS7 systems using media and signaling gateways Determine user locations with REGISTER and presence techniques Augment functionality using RFCs and packet cable extensions Prevent hijacking, tampering, DoS, DDoS, and BOTS attacks Implement reliable authentication, encryption, and intrusion detection policies


Author Notes

Travis Russell is a senior manager at Tekelec with more than 25 years of experience in data and voice networks


Table of Contents

Acknowledgmentsp. xiii
Introductionp. xv
Chapter 1 Architecture of a SIP Networkp. 1
The Traditional Voice Networkp. 2
Wireline Network Architecturep. 2
Wireless Network Architecturep. 5
Network Elements in a Voice over IP Networkp. 7
Media Gateway (MG)p. 9
Media Gateway Control Function (MGCF)p. 10
Signaling Gatewayp. 10
Application Servers (ASs)p. 11
The Domain Name System (DNS)p. 11
Electronic Numbering (ENUM)p. 12
SIP-Specific Entitiesp. 13
User Agents (UAs)p. 14
Proxy Serversp. 16
Redirect Serversp. 18
Registrarsp. 19
Location Serversp. 19
Chapter 2 Structure of the SIP Protocolp. 21
SIP Messages and Formatsp. 21
Concept of a Dialogp. 23
Requestsp. 25
Responsesp. 26
Header Fieldsp. 28
SIP Identitiesp. 42
Private User Identityp. 44
Public User Identityp. 45
Session Description Protocol (SDP)p. 46
Session Descriptionsp. 48
Time Descriptionsp. 50
Media Descriptionsp. 51
Attributesp. 52
Chapter 3 SIP Status Codesp. 55
1xx Provisional Codesp. 57
2xx Successful Status Codesp. 59
3xx Redirection Status Codesp. 60
4xx Client Failure Status Codesp. 61
5xx Server Failure Status Codesp. 69
6xx Global Failure Status Codesp. 70
Chapter 4 Registration Procedures in a SIP Networkp. 73
Basic Registrationp. 74
Event Notificationp. 77
Message Waiting Indication (MWI)p. 77
Interworking with the PSTNp. 79
Chapter 5 Establishing a Session in SIPp. 91
Accessing the Networkp. 92
Initiating a Dialogp. 93
Client Requestp. 97
Server Responsep. 99
Emergency Session Establishmentp. 101
SIP Routingp. 102
Loose Routingp. 103
Strict Routingp. 108
SIP Session Modificationp. 111
SIP Session Terminationp. 112
Chapter 6 Extending SIP to Support New Functionsp. 115
The Concept of SIP Extensionsp. 116
How Extensions are Documentedp. 117
How Extensions are Treatedp. 117
Some Examples of Extensionsp. 118
P-Access-Network-Infop. 119
P-Answer-Statep. 120
P-Asserted-Identityp. 121
P-Associated-URIp. 121
P-Called-Party-IDp. 122
P-Charging-Function-Addressesp. 122
P-Charging-Vectorp. 123
P-Early Mediap. 124
P-Media-Authorizationp. 125
P-Preferred-Identityp. 125
P-Profile-Keyp. 126
P-User-Databasep. 126
P-Visited-Network-ID Headerp. 127
Packet Cable Extensionsp. 128
P-DCS-Trace-Party-IDp. 128
P-DCS-OSPSp. 128
P-DCS-Billing-Infop. 129
P-DCS-LAESp. 130
P-DCS-Redirectp. 131
Chapter 7 Security in a SIP Networkp. 133
Types of Network Attacksp. 134
Registration Hijackingp. 135
Session Hijackingp. 136
Impersonating a Serverp. 137
Tampering with Message Bodiesp. 138
Tearing Down Sessionsp. 138
Denial of Service and Amplificationp. 139
Bots and DDoS Attacksp. 140
Security Measuresp. 141
Password and Access Controlsp. 145
Encryptionp. 146
Authentication and Authorizationp. 149
Strict Routingp. 150
Security Solutionsp. 151
Intrusion Detectionp. 152
Intrusion Protectionp. 156
Appendix A SIP-Related RFCsp. 159
IETF SIP Requests for Comments (RFCs)p. 159
Appendix B Methods and Parametersp. 163
ACK Methodp. 164
BYE Methodp. 165
CANCEL Methodp. 170
INVITE Methodp. 172
MESSAGE Methodp. 178
NOTIFY Methodp. 182
OPTIONS Methodp. 186
REGISTER Methodp. 191
SUBSCRIBE Methodp. 196
UPDATE Methodp. 201
Appendix C Methods and Parameters from a Proxy Perspectivep. 207
ACK Methodp. 208
BYE Methodp. 209
CANCEL Methodp. 213
INVITE Methodp. 215
MESSAGE Methodp. 220
NOTIFY Methodp. 224
OPTIONS Methodp. 229
REGISTER Methodp. 233
SUBSCRIBE Methodp. 238
UPDATE Methodp. 243
Bibliographyp. 247
Indexp. 251