A Technical Analysis of SIP and P2P Networks Centralization and Decentralization
|
|
- Brittany Cook
- 7 years ago
- Views:
Transcription
1 A Technical Analysis of SIP and P2P Networks Centralization and Decentralization Xie Xiaolei Helsinki University of Technology Abstract The session initiation protocol (SIP) is an application layer control protocol intended for creating, modifying and terminating multi-participant sessions such as internet telephony, conferencing, messaging and file transfer. The functionalities of SIP are organized in a centralized manner and heavily rely on dedicated servers. Moreover, in order to accomplish the data transmission in those sessions, SIP must be used in combination with other protocols such as RTP, RTSP, SDP, though it does not depend on such protocols. In contrast, the same functionalities are provided by P2P protocols in a totally decentralized manner. Among them, Skype is characteristic. It works in a decentralized fashion both in session initiation and in the following data transmission. In this paper we evaluate the advantages and disadvantages of these two approaches, from a perspective of centralization and decentralization. The area of the evaluation includes session setup latency, quality of service and protocol openess. KEYWORDS: Peer-to-Peer (P2P), Voice over IP (VoIP), Session Initiation Protocol (SIP) 1 Introduction The session initiation protocol (SIP) is a protocol designed to setup sessions. The typs of such sessions may vary from message sessions in chat systems to multimedia and multiparticipant sessions in internet telephony or conference. Currently the standardized version of SIP, RFC 3261, accomplishes its task by setting up lots of servers to provide registration, proxy, and location services to clients. This centralized architecture is rather traditional and undoubtedly has its advantages, e.g. a low latency in connection establishment, but on the other hand, it also has some critical drawbacks, such as being subject to denial-of-service attacks, the lack of robustness and scalability, etc. P2P protocols such as Skype and emule, while providing the same functionalities of internet telephony, conferencing, etc, do not suffer from those problems. By organizing their overlay networks in a decentralized fashion, P2P protocols become much more robust and scalable than their competitors of the traditional fashion. This is why many efforts have been taken recently to incorporate the P2P technology into SIP. A complete session discussed in the above can be roughly divided into three phases connection establishment, data transmission and session termination. The differences between centralization and decentralization are most remarkably manifested in the first two phases. Thus in this paper we shall focus on the behavior of SIP and P2P networks during these two phases. In the next section we shall take a close look at the process of connection establishment in SIP and in a P2P framework, for the latter of which, Skype is taken as a case study. Then we tend to file transfer in both networks. For SIP, the internet draft published as [9] is carefully studied; for P2P, because the protocol used by Skype is not open to the public, we turn our attention to emule, a popular P2P file sharing application with an open protocol. It is notable that Skype originates from the file sharing application KaZaa [11]. Thus we have a good reason to believe that studies of such an application will reveal to us the mechanisms of P2P data transmission, including those employed by VoIP applications such as Skype. 2 Connection Establishment 2.1 SIP Registration The premise of any dialog in SIP, which involves the inviter and an invitee, is a successful registration of the latter. In other words, a user agent server (UAS) must first register itself to a local registrar server and hence make itself reachable through the local location service before it is able to receive any incoming INVITE request. The registration is done by issuing a REGISTER request to the local registrar server, indicating the domain for which the registration is meant, the user name to be registered and a list of contacts to be bound with the domain and the user name. A contact specified in the list could be of any URI scheme, such as a telephone number with a tel URL, an address with a mailto URL or a more specific SIP/SIPS URI. Some other information is also included in the REGISTER request, but for clarification it is omitted here. Now that a user agent client (UAC) has constructed a REGISTER request, its next task is to locate a registrar server and send the request to the server. There are three alternatives specified in RFC 3261 [1] for the UAC to carry out this task. The first is to follow local configurations. The UAC may be configured with the address of a local registrar server and when needed, send the request there without any
2 extra efforts. Secondly, the UAC may send the request to the host that appears in the SIP address in question. For example, if the SIP address is the UAC may send the request to sip:tkk.fi using the normal SIP server location mechanisms. Finally, the UAC can send the REGISTER request to the well-known "all SIP servers" multicast address "sip.mcast.net", which translates to A UAS listening to this address will receive the request and make bindings accordingly Invite Request Here we take a close look at the process that starts a SIP call session, which literally comprises one or more dialogs. A session is always started by the originator sending INVITE requests to desired participants. Such a request includes in its header fields, among others, the address of the recipient, which can be of any URI scheme as is a contact in the REG- ISTER request, the address of the originator, the ID of the attempted call, and a sequence number of the request. [1] Once the request is generated, the UAC computes the destination by querying DNS for SRV (Service record) and NAPTR (Naming Authority Pointer) records about the domain specified in the targeted SIP address [3] (tkk.fi as in alice@tkk.fi), or by following local policies if any. [1] Then the request is sent. If its receiver is a stateless UAS, which is primarily used to handle unauthenticated requests, a challenge response is most likely to be generated; if the receiver is a redirect server, which has access to some location service, the server would use the service to generate a list of alternative locations and return it in a final response. [1] If, however, the receiver of the INVITE request is a proxy server, the successive operations become more complicated. The proxy server will first validate the request. This procedure includes checking the URI scheme, the Max-Forwards field, the Proxy-Require field, etc. If one of these checks fails, the server will conclude the request by responding with an error code. [1] If the request passes the validation, the proxy server will preprocess the route information contained in the request and then determine the target of the request and finaly forward it. [1] After all these relays by the intermediate servers, the IN- VITE request will eventually arrive at its desired UAS and if it is accepted, the two parties will start data transmission using a transport protocol. 2.2 Skype Registration According to [6], user directories in Skype are maintained in a totally decentralized manner, by utilizing the Global Index (GI) technology. GI constructs a multi-tiered overlay network where every node gains full knowledge of all the available users and resources not by contacting a central server but by participating in the communication between super nodes. This way the central login server, which used to be a vital component in the Skype network, can be removed and with it the bottleneck of the whole network performance. During the first login after installation, a Skype client (SC) sends UDP packets, if UDP is not restricted, to some well-known Skype nodes (bootstrap super nodes, as they are called in [2]) and establishes a TCP connection with those that respond. However, if UDP is restricted by a firewall, the SC will try to establish a TCP connection with one of the bootstrap super nodes. At the end of a login process, an SC tries to advertise its arrival in the Skype network by sending UDP packets to other online nodes. This attempt will be made as long as the SC is not behind a UDP-restricted firewall. After that, according to the received responses, the SC will maintain a table of reachable online nodes and, once its super node [2] goes down, it will resort to these nodes instead. It is notable that the SC maintains in the windows registry a list of possible super nodes. This list is first populated by the bootstrap super nodes during the first-time login, and then, as we conjecture, enriched by election from the table of online nodes User Location In order to start a multimedia session with another user identified by a Skype user ID, an SC must first find out the availability of that user and if the user is available, the address of it, before the session can be initiated. Because the Skype protocol is not open and its messages are encrypted, detailed investigations into this process is impossible. However, according to the experiments in [2], the super node of an SC is responsible for providing candidates of the desired user for the SC to query. The first batch of candidates provided by the super node contains 4 address-port pairs and the next contains 8, and so on. If the desired user is not found in one batch, the SC will contact its super node for the next. It remains unknown how the SC decides to terminate the search if the user is not found. 2.3 An Evaluation Latency is obviously the major concern when we consider connection establshment, hence it should be the main criteria in evaluating the two approaches. The widely deployed servers in the SIP architecture now show their contributions: The redirect servers, which provide location services to each other and proxy servers, are carefully configured with local information and consequently are able to route a request/response more accurately to its destination. Thus after a few hops, the request/response will be eventually delivered. In contrast, P2P protocols may incur many more efforts to do the same. In general, the capability and hence responsibility of a node in a P2P network change from time to time, making the information about it stored by other nodes out of date and leading to incorrect routing. Nevertheless, a node may leave its network abruptly and as a result, the affected part of the network has to be re-structured, causing a high latency or even connection failure. However, when we consider the openness as well as the adaptability of protocol, SIP is definitely more preferable. SIP is intended to be a general mechanism for internet telephony and hence its registration process is highly scalable and can be easily adapted to specific administrative policies.
3 On the opposite, Skype is intended and designed to be a proprietary service. It does not follow any open standard to make possible cooperating with other internet telephony software, nor does it support configuration to a specific local area network (LAN) environment. 3 File Transfer 3.1 File Transfer in SIP MSRP The Message Session Relay Protocol (MSRP) is a protocol intended to transfer a series of messages in a SIP session. However, the capability of MSRP is not restricted to the transmission of plain-text messages. Furthermore, it is able to transfer any content that is compliant with the Multipurpose Internet Mail Extensions (MIME) [12], including audio and vedio clips. [9] The basic idea of file transfer using MSRP in a SIP session is to embed the file in question into the stream of instant messages as a MIME object. Moreover, in order to avoid blocking the interactive message exchange while transferring a large file, the same transport connection is shared between both transmission operations. [9]. In the following sections, we shall take a closer look at MSRP Message Partition Since the same transport connection is shared between the transfer of files and the transfer of instant message streams, a large file must be partitioned, and the transmission of the resulting parts must be regularly interrupted, so that the message stream is allowed some chances to be transferred. MSRP provides such a mechanism that allows a large file to be delivered using several SEND requests (such SEND requests are hereafter referred to as MSRP requests in the rest of this section), each of which carries a single chunck of the file. And in turn, each of these chuncks can be interrupted during its transmission. [9] To make possible the partition mechanism, an MSRP request always starts with a unique identifier, which is also regarded as the terminating symbol of the last request. Also, included at the end of the ending line of an MSRP request is a flag that indicates whether the chunck carried by the current request is the last chunk of the message (which contains the file being transferred). Moreover, in the header field of the MSRP request, there is a byte-range header that indicates the overall position of the current chunck in the complete message. With the help of this header, the message can be reconstructed even if the arrival of the seperate messages are disordered. [9] The following figure depicts the partition mechanism described in the above: + <- (1) <- (2) + <- (3) + <- (4) <- (5)... + <- (6) + <- (7)... <- (8)... $ <- (9) 1. beginning of the file and the 1st chunck; the 1st SEND request 2. 1st interrupt 3. the file is to be continued 4. beginning of the 2nd chunck; 2nd SEND request 5. the 2nd interrupt 6. the file is to be continued 7. beginning of the i-th chunck 8. the n-th interrupt 9. the end of the message (file) A Transaction of File Transfer When an MSRP end-point wishes to send a file to another end-point, it will first look into the type of the other endpoint s URL to determine the type of transport connection that it is supposed to use (TLS, TCP, etc.). Particularly, if the URL scheme of the other end-point is msrp:, then a TLS connection must be used. [9] MSRP advocates reusing transport connections. Whenever a connection is needed, the party in question should first check whether it already has a connection associated with the desired host, port and URL scheme. And if it does, it should reuse the existing connection. [9]Following this rule, embedding files into active message streams will be a common case. This strategy positively reduces the number of connections involved in each session and hence reduces the overall transportation cost. However, due to the fragile nature of end-to-end transportation in networks with a low quality of service, we would still expect the transmission of very large file eg. using MSRP in such networks to be error-prone and consequently not practical. Anyway, MSRP is only intended for casual file transfer in message sessions instead of large-scale resource spreading, which is the designed capability of many popular P2P networks, e.g. emule.
4 3.2 File Transfer in P2P P2P File Transfer in General File transfer (sharing) is one of the best known uses of P2P technology. A node joins the P2P overlay network by connecting to some of the nodes that are already in the network. When a node wishes to download a file, it will contact its neighbors to locate the providers of the file and then request those providers to transfer the file Distributed Hash Table Nowadays most P2P systems use a Distributed Hash Table (DHT) to locate resources. In such a system, every resource is assigned a resouce-id, which is obtained by hashing some keyword of the resource that uniquely identifies the resource. On the other hand, the nodes in the overlay network are also each assigned a node-id, which is in the same hash space as the resource-id s. [13] A node in the overlay network is responsible for storing the resources whose resource-id s are close to the node s node-id. When a node enters/leaves the overlay network, the responsibility area of each node in the network will be recalculated, so that the hash space of the resource-id s is always completely covered. After the re-calculation, the nodes in the overlay network will exchange resources to cover their own responsibility areas. [13] In most P2P architectures, e.g. Skype, emule, a node in the DHT knows about more other nodes in the DHT as the distance of interest decreases. When a user tries to search for a resource, the node in which it resides will contact the node that it knows about and that has the node-id closest to the desired resource-id. If, however, the contacted node does not have the requested resource, it will either suggest the closest node that it knows about, or instead consult that node itself and then returns the answer. [13] In this fashion, a request will eventually reach the node that is responsible for the desired resource; that node will then reply to the requester. [13] Chord Chord is a popular DHT algorithm. It organizes the hash space of DHT in a ring structure. In this structure, the node with hash value 0 will be considered ajacent to the node with hash value 2 n 1 in the DHT, where 2 n 1 is the largest possible value in the hash space. Moreover, each node in the structure keeps a table of n pointers to other nodes. The i- th (0 <= i <= n-1) pointer in this table points to a node that is at least 2 i units away from the node in question. Thus the farthest colleague that a node knows about will be 2 n 1 units away, the longest distance possible in the DHT, and as the considered distance decreases, more and more colleague nodes are within its acquaintance. [13] File search in chord is done by sending requests to the node with the node-id closest to the desired resource-id. That node will know about more nodes in that area of the DHT (or has a better resolution about that area of the DHT, as is said in [13]) and hence, by following the same rule of closest node-id, it will be able to route the request closer to the node that is responsible for storing the desired resource. This process will be repeated recursively until the request eventually arrives at the node of responsibility A case Study of emule In this section we shall look at emule more closely. emule is one of the most popular P2P file sharing applications. Through a careful study of it, we demonstrate the decentralized nature of P2P and the great powers this nature brings. In the first part we go through a transaction of emule file transfer, and look into the collaboration between different nodes; then in the second part we study a file search operation initiated by a human user. A Transaction of File Transfer The emule overlay network comprises several hundreds of dedicated servers and millions of clients. Upon startup, an emule client will try to connect to a single emule server using TCP and if successful, it will be assigned a client ID, which will be valid until the TCP connection is closed. [4] There are two categories of client ID s in the emule network [4]: high ID s and low ID s. High ID s are only given to those clients that are able to accept incoming TCP connections and these ID s are simply the big endian representation of each client s IP address. Clients other than those are given low ID s, which are lower than 0x Being assigned a low ID has several implications. First of all, as the bearer of the ID is unable to accept incoming connections, all its communication has to be done through the emule server. This will result in a higher probability of rejection by the latter when the client makes its startup connecting attempt. Secondly, as emule servers don t support forwarding requests between each other, a low ID client is unable to interact with another low ID client connected to a different server. [4] After successfully establishing a TCP connection with an emule server, a client sends to the server a list of its shared files and following that a list of files that it wishes to download. In response, the server will send the client a list of other clients that share the files desired by the latter. Then the client will contact those in the list to request that it be added to their download queue. In the same request, it will also specify which file parts are desired by it. [4] Usually, a client will request the file parts that are owned by fewest other uploading clients so as to aid the distribution of those file parts. By doing so, the rare parts are more quickly spreaded and hence are less likely to become a bottleneck. However, so far I haven t found out how a client knows which parts of a file an uploading client owns or which uploading clients have which parts among those it needs. [4] Nevertheless, the low ID clients are unable to accept incoming requests, so the requests directed to them have to be relayed by the server to which they are connected. Such requests directed to a low ID client are called callback requests. Upon receiving such a request, the server will send the low ID client a "callback requested" message containing the address and port number of the request s initiator and ask the low ID client to call back. Obviously, these callback re-
5 quests can be initiated only by the high ID clients, which are capable of accepting incoming connections. [4] When a request has reached the top of another client s download queue, its initiator will be informed by a connection request from the uploader. if, however, at this moment the initiator has obtained the previously needed file part, it will reject the request. This is not an unusual case since the same client can be in the download queue of several other clients, requesting the same file parts; yet, when it completes downloading a file part, it does not cancel its requests to other clients, but simply rejects those clients connection initiatives when they are made. Here we should note that keeping the registrations no longer needed is better than canceling them, as the former approach does not require an extra log of download requests. [4] Moreover, how fast a request advances in a download queue is dependent on who has sent it. In the emule network, each client is identified by a unique user ID, which is a concatenation of 14 random and 2 fixed bytes and which is valid across sessions. The user ID s are related to a credit system. The more files a user has uploaded to others, the faster the requests sent by this user will advance. In order to support this credit system, an encryption scheme is integrated into the emule protocol to prevent impersonating. [4] File Search A file search operation is first initiated from the user interface. Then the emule client will send the search request to its server. In response, the server will send back a list containing the sources for each of the requested files. After getting this list, the client will send download request(s) to each source. [4] However, a client can have only one connection with the same source even if it wishes to download more than one file from the latter. So it has to decide which file to request when several are available. Currently this decision is based on the priority specified by the user and if the user doesn t specify any, the files will be requested in alphabetical order. [4] In our opinion, some improvements could be made to the above algorithm so as to achieve higher performance and/or better user satisfaction. For instance, if a client chooses to first download the file that has the smallest uncompleted portion, a better user experience can be expected. 3.3 An Evaluation between the Two Solutions The file transfer mechanism proposed by MSRP is fairly suitable for casual file transfer involved in message sessions. Its advocation of connection reuse helps save the cost of connection establishment, as is undoubtedly a good measure to enhance the overall efficiency of the SIP network. The strategy of file partitioning, on the other hand, gives an effective solution to the potential blocking of interactive message streams, provided that a single connection will be used for both message delivery and file transfer. MSRP serves as a good solution to file transfer in message sessions where human users are actively participating and files in question are relatively small, but it is definitely not a good candidate for file sharing in larger scales, which inherently requires better robustness and scalability. In this realm P2P technologies come to show their great powers. The most fundamental idea of the Peer-to-Peer architecture is that every node of the network has an equal importance in the network and that each node serves others with its resources, e.g. data, bandwidth, and processing capability, while enjoying services provided by others. Although a particular node may be unable to provide certain services and when it is able to, the quality of service may vary from time to time, the overlay network as a whole, in most cases, is able to provide the intended services and furthermore, maintain the quality at a decent level. With the P2P architecture, the robustness and scalability of an overlay network are more easily achievied but, nevertheless, P2P also brings its own problems, such as being subject to denial-of-service attacks, file searches being unable to exploit the entire overlay network, the necessity of re-structuring, etc. Targeting at these problems, a variety of DHT algorithms have been proposed and studied. Hopefully, these efforts will yield a satisfactory solution. 4 Conclusion First of all, what SIP describes is a general mechanism for internet telephone calls, multimedia distribution, and multimedia conferences. Presented by SIP is a flexible and extensible overlay network that consists of sub-networks, independant service providers, end users and so on. Furthermore, these components could be various interest parties, for example, commercial/non-commercial VoIP operators, location service providers, Internet service providers (ISP), etc. In a word, all kinds of participants can be easily involved and differently configured networks can be seamlessly integrated into the SIP network. In contrast, the P2P counterparts of SIP, for example, Skype and emule, do not enjoy such flexibility and extensibility. Their networks are each dedicated to a specific functionality and each have their own user group and are not expected to merge easily. From this point of view, SIP certainly has a big advantage. However, when performance becomes the major concern, P2P networks such as Skype prevails. P2P networks are designed to be scalable yet providing a high-quality service. As we understand, such desirable features originate from the distributed nature of P2P networks and the clever algorithms fully utilizing this nature. On the other hand, SIP heavily relies on servers for location service, request redirection (redirect servers) and delegation (proxy servers) and hence are not as scalable as its P2P counterparts. Moreover, owing to the limited capabilities of the SIP servers as well as to the end-to-end data transmission (using RTP, MSRP, etc), the quality of service offered by SIP, on average, may not be as good as that offered by P2P networks. For these reasons, recent efforts have been taken to incorporate P2P technologies into the SIP framework.
6 References [1] J. Rosenberg, etc. SIP: Session Initiation Protocol. RFC 3261, IETF Network Working Group, June [2] Salman A. Baset and Henning Schulzrinne. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. September 15, [3] J. Rosenberg, H. Schulzrinne. Session Initiation Protocol (SIP): Locating SIP Servers June, [4] Yoram Kulbak and Danny Bickson. The emule Protocol Specification. January 20, [5] H. Schulzrinne, etc. RTP: A Transport Protocol for Real-Time Applications January, [6] Skype Limited. P2P Telephony Explained For Geeks Only [7] D. Milojicic, V.Kalogeraki, R. M. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, and Z. Xu. Peer-to-Peer computing. technical report HPL , Technical Publications Department, HP Labs Research Library, March, 2002 [8] A. Gupta, B. Liskov, and R. Rodrigues. One hop lookups for peer-to-peer overlays. In HotOS IX: The 9th workshop on hot topics in operating systems, Lihue, Hawaii, USA, May USENIX [9] J. Rosenberg, M. Isomaki, et al A Mechanism to Enable File Transfer with the Session Initiation Protocol (SIP) February 23, [10] B. Campbell, R. Mahy, C. Jennings The Message Session Relay Protocol (MSRP) February 25, [11] Sharman Networks Ltd How Peer-To-Peer (P2P) and Kazaa Software Works February 23, [12] Freed, N. and N. Borenstein Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Bodies, RFC 2045 November [13] D. Bryan, B. Lowekamp, et al A P2P Approach to SIP Registration and Resource Location draft-bryansipping-p2p-02 Internet-Draft March 5,2006
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationEE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationSIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
More informationSession Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationAn Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca
More informationSkype VoIP service- architecture and comparison
Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P)
More informationSession Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
More informationSIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication
More informationMobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This
More informationBest Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationUser authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1. Introduction to Session Internet Protocol... 2 2. History, Initiation & Implementation... 3 3. Development & Applications... 4 4. Function & Capability... 5 5. SIP Clients & Servers... 6 5.1.
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationA Peer-to-peer Secure VoIP Architecture
A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used
More information7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP
Burapha University ก Department of Computer Science 7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP
More informationSIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
More information(Refer Slide Time: 6:17)
Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol
More informationA P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt
A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach
More informationSIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
More informationWhite paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
More informationA Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract
More informationChapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
More informationPeer-to-Peer Internet Telephony using SIP
Peer-to-Peer Internet Telephony using SIP Kundan Singh and Henning Schulzrinne Department of Computer Science, Columbia University 1214 Amsterdam Ave, Mail Code 0401 New York, NY 10027, USA {kns10,hgs}@cs.columbia.edu
More informationSession Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
More informationNetwork Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationA Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationSIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
More informationAn Efficient Server Load Balancing using Session Management
An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,
More informationSkype network has three types of machines, all running the same software and treated equally:
What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationSIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
More informationProject Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
More informationSIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
More informationSOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System
1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationInternet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
More informationMultimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
More informationThis specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationChapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationBasic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future
More informationA Realization method of Voice over IP System Passing Through Firewall and its Implementation
A Realization method of Voice over IP System Passing Through Firewall and its Implementation Masashi Ito and Akira Watanabe Graduate School of Science and Technology, Meijo University, Japan m0432004@ccmailg.meijo-u.ac.jp,
More informationSIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
More informationNAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree.
Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com David Schwartz Director, Telephony Research davids@deltathree.com Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted
More informationVoice over IP Fundamentals
Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long
More informationBest Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
More informationMultimedia Conferencing with SIP
Multimedia Conferencing with SIP Signalling Demands in Real-Time Systems Multimedia Networking: Protocol Suite Conferencing: VoIP & VCoIP SIP SDP/SAP/IMG Signalling Demands Media Types can be signalled
More informationDesign of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
More informationSession Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
More informationSession Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
More informationVoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
More informationImplementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationQuantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature
A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative
More informationDissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More information2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: rfarha@comm.utoronto.ca ABSTRACT This paper presents a novel solution to
More informationNeed for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
More informationMedia Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
More informationOVERVIEW OF ALL VOIP SOLUTIONS
OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype
More informationWeek 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks
Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard ACM ReArch 2009 Main point Content-centric
More informationVoice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
More informationVoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
More informationMulticasting with Mobile IP & The Session Initiation Protocol
Multicasting with Mobile IP & The Session Initiation Protocol Hamad el Allali and Cristian Hesselman Abstract This report discusses how Mobile IP deals with multicast communications and describes a possible
More informationSHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...
VoIP Conference Server Evgeny Erlihman jenia.erlihman@gmail.com Roman Nassimov roman.nass@gmail.com Supervisor Edward Bortnikov ebortnik@tx.technion.ac.il Software Systems Lab Department of Electrical
More informationService Quality Assurance Mechanisms for P2P SIP VoIP
Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology
More informationSIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
More informationVoice over IP Communications
SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationBest Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011
Best Practices for Role Based Video Streams (RBVS) in SIP IMTC SIP Parity Group Version 33 July 13, 2011 Table of Contents 1. Overview... 3 2. Role Based Video Stream (RBVS) Best Practices Profile... 4
More informationVulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationMODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,
More information159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
More informationDesign, implementation and analysis of a large scale audio conferencing system using SIP
Design, implementation and analysis of a large scale audio conferencing system using SIP A n t ó n i o V a r a n d a & T i a g o L o u r e i r o Master of Science Thesis Stockholm, Sweden 2006 ECS/ICT-2006-07
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationChapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More information3 The Network Architecture
SIP-H323: a solution for interworking saving existing architecture G. De Marco 1, S. Loreto 2, G. Sorrentino 3, L. Veltri 3 1 University of Salerno - DIIIE- Via Ponte Don Melillo - 56126 Fisciano(Sa) Italy
More informationDesktop sharing with SIP
Author : Willem Toorop Supervisor : Michiel Leenaars February 2, 2009 Abstract This report describes how Desktop and Application sharing sessions can be realised using SIP. Investigated is what possibilities
More informationBest Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
More informationIP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
More informationImplementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
More informationSIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
More informationETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
More informationDesktop sharing with the Session Initiation Protocol
Desktop sharing with the Session Initiation Protocol Author : Willem Toorop Supervisor : Michiel Leenaars February 25, 2009 Abstract This report describes how Desktop and Application sharing sessions can
More information1 SIP Carriers. 1.1 Tele2. 1.1.1 Warnings. 1.1.2 Vendor Contact. 1.1.3 Versions Verified SIP Carrier status as of Jan 1, 2011. 1.1.
1 SIP Carriers 1.1 Tele2 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
More information