SlideShare a Scribd company logo
Session Initiation
Protocol: An Overview
Chaitanya T K,
DataCom
Only those who dare to
fall greatly can achieve
greatly
Robert Kennedy
Agenda:











Telephony and VOIP basics
Need for SIP?
Welcome to SIP World
Basic Operation and message formats
Layering in SIP
Types of proxies
Detailed Handshakes
Dialogs and routing
Handling QOS
Issues with SIP
Telephony and VOIP
basics
Intro to VOIP:
Circuit Vs. Packet
Switching:




Advantages of circuit switching:
---Fixed delays, because of the
dedicated circuit
-- Guaranteed continuous service,
also because of the dedicated
circuit
Disadvantages of circuit
switching
-- idle circuits are not used
-- Difficult to support variable
data rates and is not efficient
for burst traffic


Advantages of Packet Switching
-- can provide variable data
rates
-- better for "bursty" traffic



Disadvantages of Packet Switching
-- Packets arriving in wrong
order
-- Variable delays
Session intiation protocol tk
Session intiation protocol tk
Welcome to the SIP world
Need for SIP?:




•
•
•


What is a session?
- Data Exchange between an
association of participants
These data exchange is
complicated since:
Users can move
User can use Multiple names
Users can change the media
A protocol that monitors and
controls all these actions need
to developed.
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Functionalities provided by
SIP:










User location: determination of the end
system to be used for communication;
User availability: determination of the
willingness of the called party to
engage in communications;
User capabilities: determination of the
media and media parameters to be used;
Session setup: "ringing", establishment
of session parameters at both called
and calling party;
Session management: including transfer
and termination of sessions, modifying
session parameters, and invoking
services.
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Key SIP Proxy Roles:






Security: With admission control
policy,SIP proxy enforces who may
call whom,and eventually reports
usage
Services: proxy servers can
implement a variety of services:
missed calls,forwarding,
screening, etc.
Routing: Finding the right
recipient of a call (gateway,
voicemail, SIP-phone, foreign
domain, etc.)
Session intiation protocol tk
Transaction:
Dialogs:
Session:
Basic Steps in Operation of
SIP:
Registration:
Registration request
format:
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
INVITE Message Format:
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Stateful versus Stateless
Stateless mode:
Proxy







– Usage: good for heavy-load
scenarios -- works well for
example if they act as
application-layer load
distributors.
– Behavior: proxies just receive
messages, perform routing logic,
send messages out and forget
anything they knew
- Memory consumption is constant
(which is key for some scenarios
– transaction context takes up to
7k of memory!)
Stateful mode:






Usage: good for implementing some
services (e.g.,“forward on no reply”)
Behavior: proxies maintain state
during entire transaction; they
remember outgoing requests as well as
incoming requests that generated them
until transaction is over; they do not
keep state during the whole call
Used for services such as accounting
(for aggregating requests with
responses and filtering retransmissions
out), forking (for picking the ‘best’
answer), forwarding on some event
(state helps to postpone decision
making till an event such as ‘line
busy’ occurs), etc.
Session intiation protocol tk
Session intiation protocol tk
Methods and Responses:
SIP Methods:
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Dialogs and Routing-INVITE:
Dialogs and Routing-180:
Dialogs and Routing-200:
Dialogs and Routing-ACK:
Dialogs and Routing-BYE:
Dialogs and Routing-200:
Layers in SIP:
Layers in SIP:






The structure of the SIP protocol, as outlined
in chapter 5 of RFC 3261: "The lowest layer is
the transport layer. It defines how a client
sends requests and receives responses and how a
server receives requests and sends responses
over the network. All SIP elements contain a
transport layer.
The second layer is the transaction layer. A
transaction is a request sent by a client
transaction (using the transport layer) to a
server transaction, along with all responses to
that request sent from the server transaction
back to the client. Any task that a user agent
client (UAC) accomplishes takes place using a
series of transactions. Stateless proxies do
not contain a transaction layer.
The layer above the transaction layer is called
the transaction user (TU). Each of the SIP
entities, except the stateless proxy, is a
transaction user."
Summary of Call setup Flow
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Session intiation protocol tk
Issues with SIP


Security:


Authentication of signaling data
using HTTP digest authentication



TLS usage (over TCP)



Usage of IPSec (SIP VPN Scenario)



Use SecureRTP for Media



Use S/MIME to enable mechanisms like
public key distribution,
authentication, integrity and
confidentiality of SIP signaling data
Session intiation protocol tk
NAT with SIP:
Session intiation protocol tk
SIP Vs. H.323
Judge a man by his
questions rather than his
answers

Voltaire
Thank You -

More Related Content

PPTX
Design And Implementation Of A Phone Card Company
PDF
The benefits of preparing and authorizing wire transfers anywhere in the world
PDF
Ecmo en el choque cardiogenico desde la puesta en marcha de un programa de ec...
PDF
Aboutsip - intro to transactions and dialogs
PDF
SIP - The Basics
PDF
Kamailio :: A Quick Introduction
PDF
Aboutsip - SIP Routing
PDF
Review of SIP based DoS attacks
Design And Implementation Of A Phone Card Company
The benefits of preparing and authorizing wire transfers anywhere in the world
Ecmo en el choque cardiogenico desde la puesta en marcha de un programa de ec...
Aboutsip - intro to transactions and dialogs
SIP - The Basics
Kamailio :: A Quick Introduction
Aboutsip - SIP Routing
Review of SIP based DoS attacks

Similar to Session intiation protocol tk (20)

PPTX
Session initiation protocol
PPTX
Voip security
PPTX
SIP security in IP telephony
DOC
PPT
Sinnreich Henry Johnston Alan Pt 2
PPTX
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
PPTX
session initiation protocol - SIP
PPT
Introduction To SIP
PDF
AINTEC 2023: Networking in the Penumbra!
PPT
Introduction to SIP
PPTX
FutureComm 2010: Scaling Advanced VoIP Telecom Services
PPT
SIP(final)telecom diate kophg vbnm gyufdtdbk.ppt
PDF
Networking in the Penumbra presented by Geoff Huston at NZNOG
PDF
VoIP and multimedia networking
PDF
VOIP services
PPT
Digital network lecturer4
PPT
PPT
1 VoIP Overview[1]
PPT
1 Vo Ip Overview
PPT
1 Vo Ip Overview
Session initiation protocol
Voip security
SIP security in IP telephony
Sinnreich Henry Johnston Alan Pt 2
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
session initiation protocol - SIP
Introduction To SIP
AINTEC 2023: Networking in the Penumbra!
Introduction to SIP
FutureComm 2010: Scaling Advanced VoIP Telecom Services
SIP(final)telecom diate kophg vbnm gyufdtdbk.ppt
Networking in the Penumbra presented by Geoff Huston at NZNOG
VoIP and multimedia networking
VOIP services
Digital network lecturer4
1 VoIP Overview[1]
1 Vo Ip Overview
1 Vo Ip Overview
Ad

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Ad

Session intiation protocol tk

  • 1. Session Initiation Protocol: An Overview Chaitanya T K, DataCom
  • 2. Only those who dare to fall greatly can achieve greatly Robert Kennedy
  • 3. Agenda:           Telephony and VOIP basics Need for SIP? Welcome to SIP World Basic Operation and message formats Layering in SIP Types of proxies Detailed Handshakes Dialogs and routing Handling QOS Issues with SIP
  • 6. Circuit Vs. Packet Switching:   Advantages of circuit switching: ---Fixed delays, because of the dedicated circuit -- Guaranteed continuous service, also because of the dedicated circuit Disadvantages of circuit switching -- idle circuits are not used -- Difficult to support variable data rates and is not efficient for burst traffic
  • 7.  Advantages of Packet Switching -- can provide variable data rates -- better for "bursty" traffic  Disadvantages of Packet Switching -- Packets arriving in wrong order -- Variable delays
  • 10. Welcome to the SIP world
  • 11. Need for SIP?:   • • •  What is a session? - Data Exchange between an association of participants These data exchange is complicated since: Users can move User can use Multiple names Users can change the media A protocol that monitors and controls all these actions need to developed.
  • 15. Functionalities provided by SIP:      User location: determination of the end system to be used for communication; User availability: determination of the willingness of the called party to engage in communications; User capabilities: determination of the media and media parameters to be used; Session setup: "ringing", establishment of session parameters at both called and calling party; Session management: including transfer and termination of sessions, modifying session parameters, and invoking services.
  • 19. Key SIP Proxy Roles:    Security: With admission control policy,SIP proxy enforces who may call whom,and eventually reports usage Services: proxy servers can implement a variety of services: missed calls,forwarding, screening, etc. Routing: Finding the right recipient of a call (gateway, voicemail, SIP-phone, foreign domain, etc.)
  • 24. Basic Steps in Operation of SIP:
  • 36. Stateful versus Stateless Stateless mode: Proxy     – Usage: good for heavy-load scenarios -- works well for example if they act as application-layer load distributors. – Behavior: proxies just receive messages, perform routing logic, send messages out and forget anything they knew - Memory consumption is constant (which is key for some scenarios – transaction context takes up to 7k of memory!)
  • 37. Stateful mode:    Usage: good for implementing some services (e.g.,“forward on no reply”) Behavior: proxies maintain state during entire transaction; they remember outgoing requests as well as incoming requests that generated them until transaction is over; they do not keep state during the whole call Used for services such as accounting (for aggregating requests with responses and filtering retransmissions out), forking (for picking the ‘best’ answer), forwarding on some event (state helps to postpone decision making till an event such as ‘line busy’ occurs), etc.
  • 52. Layers in SIP:    The structure of the SIP protocol, as outlined in chapter 5 of RFC 3261: "The lowest layer is the transport layer. It defines how a client sends requests and receives responses and how a server receives requests and sends responses over the network. All SIP elements contain a transport layer. The second layer is the transaction layer. A transaction is a request sent by a client transaction (using the transport layer) to a server transaction, along with all responses to that request sent from the server transaction back to the client. Any task that a user agent client (UAC) accomplishes takes place using a series of transactions. Stateless proxies do not contain a transaction layer. The layer above the transaction layer is called the transaction user (TU). Each of the SIP entities, except the stateless proxy, is a transaction user."
  • 53. Summary of Call setup Flow
  • 60.  Security:  Authentication of signaling data using HTTP digest authentication  TLS usage (over TCP)  Usage of IPSec (SIP VPN Scenario)  Use SecureRTP for Media  Use S/MIME to enable mechanisms like public key distribution, authentication, integrity and confidentiality of SIP signaling data
  • 65. Judge a man by his questions rather than his answers Voltaire