Session Initiation Protocol: By, Vivek Nemarugommula
Session Initiation Protocol: By, Vivek Nemarugommula
By,
Vivek Nemarugommula
Background
Overview Of Operation
Structure Of The Protocol
Definitions
SIP Messages
Dialogs
Overview
SIP is an application-layer control protocol that can establish,
modify, and terminate multimedia sessions (conferences) such
as Internet telephony calls.
SIP = ‘Session Initiation Protocol’ Proposed IETF Standard RFC
3261.
Peer-to-peer application layer protocol where
endpoints (User Agents) initiate, modify and terminate sessions.
SIP uses existing IETF protocols to provide media
negotiation (SDP), media transport (RTP), name
resolution and mobility (DHCP, DNS), and application encoding
(MIME)
SIP: Basic Idea
Users are known by SIP URIs.
Text-based encoding based on a
HTTP-like request/ response
transaction model.
Simple extensions by introducing
new ‘Methods’ and ‘Headers`
No relation between (SIP) signaling
path and data stream path.
Telephony services across the
internet.
Sessions
Confidentiality Cryptographic confidentiality means that only the intended recipients will be
able to determine the contents of the confidential area
Privacy They want to make sure others do not know what they are doing or
transmitting. Some people prefer anonymity. In a higher education
environment, faculty and student reserve the right to privacy.
The Internet Key Exchange (IKE) protocol [HC98] which is used to set
up IPsec security associations supports both Pre-Shared Key (PSK) and
Public Key (PKI) based authentication. Because the IP addresses of the
SIP user agents will be mostly dynamic and taking into account that
IKE Main Mode in that case does not work with pre-shared secrets and
that IKE Aggressive Mode is fraught with security problems (man-in-
the-middle attacks, off-line dictionary attacks on the PSK, etc.), public
key based authentication will be the preferred method.
Conclusions
Session Initiation Protocol (SIP) has become a strong, catalytic force
shaping today's telecom industry.
Using SIP, telephony becomes another web application and integrates
easily into other Internet services.
SIP was designed to specifically reuse as many existing protocols and
protocol design concepts.
SIP was also designed so that it would be easy to bind SIP functions to
existing protocols and applications, such as e-mail and Web browsers
SIP is independent of the packet layer and only requires an unreliable
datagram service, as it provides its own reliability mechanism
SIP security is very important based on its growth.
References
http://www.ietf.org/rfc/rfc3261.txt
http://www.sipcenter.com/sip.nsf/html/What+Is+SIP
+Introduction\
http://www.sipstone.org/files/sipstone_0402.pdf
http://en.wikipedia.org/wiki/
Session_Initiation_Protocol
http://www.cs.columbia.edu/sip/
http://bscwpub-itec.uni-klu.ac.at/pub/bscw.cgi/
d73544/13-Multimedia-SIP.pdf
http://www.tmf.org/hospitalqi/sip/benchmark/
Benchmark%20Processes%20to%20Improve
%20SIP.pdf