Multicasting with Mobile IP & The Session Initiation Protocol

Size: px
Start display at page:

Download "Multicasting with Mobile IP & The Session Initiation Protocol"

Transcription

1 Multicasting with Mobile IP & The Session Initiation Protocol Hamad el Allali and Cristian Hesselman Abstract This report discusses how Mobile IP deals with multicast communications and describes a possible user of Mobile IP s multicasting service, namely the Session Initiation Protocol (SIP). This report also discusses a proposal to extend SIP with functions that support terminal mobility. 1 Overview In this report we describe the results of the literature study that we performed on the topics of multicast communications with Mobile IP and the Session Initiation Protocol (SIP). We kick off with the first topic in Section 2. In this section, we give an overview of how Mobile IP deals with multicast communications and list the options that mobile nodes have at their disposal for sending and receiving multicast packets. In Section 3 we then describe SIP. SIP is an application level signaling protocol that for instance supports personal mobility. In Section 3 we give an overview of SIP and consider a recent proposal to extend SIP to also support terminal mobility. We also relate this proposal to Mobile IP as well as to regular IP and regular SIP. Readers should note that this paper discusses work that has already been published elsewhere. We do not present any new work. 2 Multicasting with Mobile IP 2.1 Overview of Mobile IP The number of mobile Internet users is growing each day. This results in a demand for new services and continuous network coverage to mobile users regardless of their location. Today s Internet only makes use of nodes with fixed network attachment points. To make continuous network coverage for mobile nodes possible, Mobile IP introduces the Home Agent (HA) in the home network of the mobile node, Figure 1 shows this. mobile node foreign agent request reply Figure 1: Mobile IP model [1]. home agent The HA has the function to keep track of the current location of the mobile node and forward the packets which are destined to the mobile node s home address to the foreign network. Mobile IP s operation relies on the mobile node having a permanent home address and an assigned care-of address. The Mobile IP model uses two kinds of care-of addresses, namely co-located care-of address foreign agent care-of address In the case of using a co-located care-of address, the mobile node in the foreign network gets a care-of address e.g. from a DHCP server. When a Foreign Agent (FA) is connected to the foreign network it can assign a foreign agent care-of address to the mobile node. Note that the care-of address is temporarily assigned. The mobile node gets another care-of address when it visits another foreign network. Before the HA can forward the packets to the foreign network it must be notified by the mobile nodes of its care-of address. The mobile nodes takes care of this by sending a registration request to the HA. When the registration has succeeded the HA will intercept all the packets with a destination address equal to the mobile node s home address. The HA forwards these packet to the foreign network by using tunnelling. The FA decapsulates the received packet and forwards it to the mobile node. If an FA is not attached to the foreign link, the mobile node must be capable of decapsulating the packet. 2.2 Mobile IP Broadcast Introduction In general, IP addresses can be divided into three categories. The first category consists of unicast addresses. Packets with such an address are destined to a single destination. The second category consists of broadcast addresses. Broadcast packets are those that are delivered to all nodes in a certain network. The last category is multicast addresses, which will be discussed in Section 3. In broadcast transmissions we can distinguish two kinds of broadcasts, namely Prefix-specific broadcasts Link-specific broadcasts The destination address in the IP header specifies the broadcast packet. In the case of prefix-specific broadcast, the destination address has the form network prefix In the case of link specific broadcast, the destination address has the form The difference between these two forms of broadcast is that the prefix-specific broadcast packets can traverse one or more intermediate routers, while the link-specific broadcast only reaches the nodes in the network where the packet is originated Receiving Broadcasts The way broadcasts are transmitted to the mobile node depends on whether the mobile node uses a foreign agent care-of address or a co-located care-of address. If the mobile node uses a co-located care-of address, the mobile node receives broadcast packets in the same way same as it receives unicast packets. This method requires that the mobile node is capable of decapsulating packets. The mobile node informs the HA that it can decapsulate by setting the D

2 (decapsulation) bit in the broadcast preference extension (see Figure 2). A problem arises when the mobile node uses a foreign agent care-of address in order to receive broadcasts from the HA. When the tunnelled packet arrives at the FA, the FA can t forward the packet to the mobile node because the FA is not able to determine the address of the mobile node from the broadcast address. This problem can be solved by using nested encapsulation. The nested encapsulated packet is a compilation of an inner packet header with a destination address equal to the mobile node s home address and an outer header with a destination address equal to a care-of address. Given this, mobile nodes with a foreign agent care-of address receive broadcast packets as follows. Firstly, the HA encapsulates the intercepted broadcast packet and will forward the packet to the FA using nested tunnelling. When the FA receives the tunnelled packet, it detunnels it by removing the outer header. It then looks at the destination address of the inner packet and sees an address equal to the mobile node s home address. The FA forwards the packet to the mobile node in the foreign network. The mobile node, in turn, decapsulates the inner packet by stripping off the inner header. The result is a broadcast packet that it passes to the higher layer. In order to notify the HA to use nested encapsulation, the mobile node must set the D bit to 0 in its registration request Sending Broadcasts The way of sending broadcast packets by the mobile node depends on the kind of broadcast. This can be done as follows: Sending a link-specific broadcast to a mobile node s home network. A mobile node on a foreign network tunnels a broadcast packet to the HA. after having decapsulated the packet, the HA will forward the broadcast to all the nodes on the home network. Sending a link-specific broadcast to a mobile node s foreign network. The mobile node transmits the broadcast on the foreign network, all the nodes in the foreign network will receive the broadcast. Sending a prefix-specific broadcast. There are two possibilities to transmit this kind of broadcast. Firstly, by using tunnelling to the HA. Secondly, the mobile node can send the broadcast on the foreign network. The intermediate routers can forward the broadcast to a specific network. Note that there s no need to make a distinction between foreign-agent care-of addresses and co-located care-of addresses Broadcast Preference Extension The mobile node is able to notify the HA of the broadcasts it wishes to receive by including a broadcast preference extensions in the registration request [1]. 8 bits 8 bits 4 bits 4 bits 8 bits type port length C P A X rsvd Protocol Type 40 Rsvd 0 Length 4 A include this preference X exclude the preference C eliminate any retained specifications P keep broadcast specification active Protocol protocol type Port port number Figure 2: Proposed broadcast preference extension [2]. Thus when we notify the HA of the assigned care-of address we can configure the HA at the same time. Note that the B and D bit are not included in the proposal of Patel and Perkins. 2.3 Mobile IP Multicast Multicast packets are destined to a group of nodes. The address of a multicast group has the form 1110.multicast-group Receiving Multicasts Mobile nodes do not have to be a member of the group to send packets to the multicast group. On the other hand, when the mobile node wants to receive multicasts from a certain group, it s required to join the multicast group. This can be achieved by sending an IGMP Host Membership Report (Internet Group Management Protocol) to a multicast router on the link to which the mobile node is currently attached. The multicast routers will add the mobile node to the delivery tree. The mobile node can receive multicasts on the foreign network by tunnelling the IGMP Host Membership Report packet to its HA. The HA will intercept the multicast packets and tunnel them to the mobile node, in exactly the same way as specified for broadcast packets. The other option is to send the IGMP Host Membership Report packet to a multicast router on the foreign network. After adding the mobile node to the tree, the router will compute the delivery tree and route the multicasts to the group members Sending Multicasts The mobile node can send multicast packets on a foreign network in two different ways: The mobile node can send multicasts by tunnelling them to its HA.. It is required that the HA is a multicast router. The mobile node can use the co-located care-of address as the IP source address and send the multicast packets on the foreign network. The requirement for this method is that in the foreign network a multicast router must be present. Before the multicast packets can be forwarded to the members of the group, the delivery path must be computed. This can be done for instance with the DVMRP [2] (Distance Vector Multicast Routing Protocol). For clarity, unicast packets are routed solely on their destination address, but multicast routing protocols also consider a packet s source address. Specifically, the source address of the packet must indicate that the packet comes from the right direction. This means that to route the multicasts, the network prefix of the source address must be equal to the network-prefix of the

3 network where the multicasts are originated. This makes mobile IP more complicated because the mobile node is not always connected to its home network. That is, the mobile node s source address may be such that a multicast routing protocol interprets it as coming from the wrong direction. Note that by using a co-located care-of address as source address in the IP header the members of the group can follow the mobility of the mobile node. This will not be a problem if the multicast router does not make use of the IP source address as the identity of the mobile node Multicast Preference Extension In multicasting it is also relevant that the mobile node notifies the HA of how it wants to send and receive multicast packets. This can be achieved by including a multicast preference extension in the registration request. Figure 3 illustrates the proposed multicast preference extension. The extension specifies the following options: 8 bits 8 bits 7 bits 9 bits type length C P A XH XF RH RF rsvd Multicast IP address Type 41 Length 6 Rsvd 0 A include this preference XH wishes to transmit from home network C eliminate any retained specifications XF wishes to transmit from foreign network RH wishes to receive from home network P keep broadcast specification active RF wishes to receive from foreign network Protocol protocol type Port port number Figure 3: Proposed multicast preference extension [2]. 2.4 Comparison of Unicast, Broadcast and Multicast We can make a comparison between the three different transmission methods. From Table 1 it can be seen that the unicast transmission is simpler to implement in the mobile IP model than the other two methods. Nevertheless, broadcast and multicast can be used in mobile IP by using tunnelling and registration techniques. The hard part, though, is that the routers must be configured correctly and be capable of handling multicast transmissions. Destination address Unicast Broadcast Multicast prefix-specific: 110.multicastgroup networkprefix link-specific Routing destination destination address destination- and address source address Destination single node all nodes group of nodes Encapsulation single nested encapsulation nested encapsulation encapsulation Registration none bit B and D IGMP packets Requirement none no broadcast filtering multicast router trough routers in network Table 1 : Comparison of the three different kinds of transmissions. 3 The Session Initiation Protocol In this section we give an overview of the Session Initiation Protocol [3, 4, 5] (SIP, Section 3.1) and discuss a recent proposal that suggests how to use SIP to support terminal mobility [6] (Section 3.2). For convenience, we refer to this version of SIP as Mobile SIP. We then relate Mobile SIP to IP and Mobile IP (Section 3.3) and discus some problems that we foresee with Mobile SIP (Section 3.4). We close with an overview of SIP s implementation status and pointers to the literature for readers who want to know more about SIP (Section 3.5). 3.1 Overview SIP is a proposed Internet standard that was published as RFC 2543 [3] in March It is an application level signaling protocol that can be used to establish, change and tear down sessions. These sessions may interconnect one or more users (multiparty sessions) and may carry one or more types of media (multimedia sessions), notably audio and video. In addition to being able to set up, change and release sessions, SIP can also be used to build advanced telephony services like call waiting, call forwarding, and so on. We will however not consider these supplementary services in this report. We refer the reader to [4] for some examples of such services. SIP is usually referred to in an IP telephony setting where it makes use of and cooperates with other Internet protocols (see later on in this section). SIP may however also be used in other environments. It can for example operate in an X.25 environment, in an AAL5/ATM environment, and so on. The only requirement for all these environments is that SIP messages (also to be discussed later on) are delivered in full or not at all. For this discussion, though, we will limit ourselves to an Internet setting. SIP is a client-server protocol. This means that its components consist of client parts that submit requests, and of server parts that process these requests and optionally respond with a result. Since SIP is an application level protocol, the user (i.e. client or server) is either a human enduser or a robot (a computer process). Similar to other application level protocols such as HTTP and SMTP, SIP is a textual protocol. This means that SIP messages are readable strings rather than arrays of bytes. Textual protocols generally have the advantage that their messages can be parsed (cf. a compiler), that the fields of protocol messages do not have to maintain a specific order, that debugging becomes easier and that additional fields can be added easily. The disadvantage is that textual protocol messages are generally longer than byteoriented ones. This may be a problem in settings were bandwidth is extremely scarce, for instance in a mobile environment. SIP has four primary functions [4, 5]. The most important one is name translation and user location. This basically means that SIP is responsible for finding the machine that a user is currently logged onto based on the high level name of that user (user location). SIP then needs to resolve the name of the machine to an IP address to contact the user (name translation). These two tasks are particularly required to allow one user to invite another to a session. We will see later on that the first task (locating a user) may involve intermediate name translations. The other three primary functions of SIP are feature negotiation (which allows the participants of a session to agree upon the set of media to use as well as on their characteristics), call participation management (allows users to invite, remove or otherwise manipulate the status of

4 user participation in a session) and call feature changing (allows the set of media in session to be changed or reconfigured). In the rest of this report we will focus on name translation and user location. SIP is part of a suite of Internet conference protocols [7]. Related protocols include the Session Description Protocol (SDP) for describing the properties of sessions (e.g. multicast address, bandwidth, media, coding, etc.); the Session Announcement Protocol (SAP) for the periodic and scoped announcement of sessions; the Real-Time Protocol (RTP) for data transfer; and RTP s counterpart the Real-Time Control Protocol (RTCP) for the feedback on QoS aspects of RTP data transfer. SIP furthermore makes use of TCP or UDP to convey its messages. SIP may use UDP in multicast mode or in unicast mode. Figure 4 summarizes the protocols related to SIP. Session Management Session Setup and Discovery TCP SIP SDP SAP UDP IP/ICMP and IP Multicast/IGMP Media Agents Audio & Video RTP/RTCP Figure 4: SIP and related Internet protocols. Addressing SIP typically identifies users by means of addresses. These addresses are of the form user@domain. The idea behind using this form of addressing is that users will generally not know the exact location of other users. They therefore require a form of location independent addressing, which is something that addresses inherently provide. Network servers are identified as usual, i.e. as machine.domain. SIP uses both user names as well as server names as part of URLs. These URLs consist of the prefix sip: followed by an address or a server name. A URL that identifies a user thus looks like sip:user@domain; a URL that identifies a server reads sip:machine.domain. Entities SIP entities run s and on nodes in the network, typically a LAN. SIP entities that run s are called Agents (UAs). UAs come in two flavors: Agent Client (UAC) and Agent Server (UAS). A UAC allows a user to issue a SIP request. A UAS receives such requests, processes them and passes them up to the user. A UAS allows its user to optionally send back a response to the UAC that issued the request. Hosts are usually equipped with both a UAC and a UAS, thus allowing them to both send and receive SIP requests. The SIP entities that run on nodes in a network are referred to as network servers. They form an application level network infrastructure whose primary task is to translate names to IP addresses and to locate users. SIP defines four kinds of network servers: proxy servers, redirect servers, registration servers and location servers. Proxy servers accept SIP requests from UACs and forward them to the UAS or to an intermediate network server on the path to the UAS. Proxy servers record the path that a request takes to get to the UAS in the request itself, thus allowing the UAS to send a response back to the UAC over the same path as that of the request. Redirect servers, on the other hand, accept requests from UACs and respond to the UAC directly. The response contains the name of the UAS or the name of a next hop server on the path to the UAS that the UAC should contact next. The types of servers used to process a UAC s request may consist of a combination of proxy and redirect servers. Observe that the UAC will not be aware of the UAS actual location nor of any intermediate servers when a request is processed by proxy servers only. Also observe that a chain of proxy servers acts like a DNS recursive lookup. Likewise, a sequence of interactions with redirect servers is similar to a DNS iterative lookup. The registration and location servers support the proxy and redirect servers. Registration servers accept registration requests from UACs specifying a user s current location. Registration servers are typically collocated with proxy or redirect servers (and we ll assume this from now on). A location sever may be anything that stores information as long as it allows the proxy and redirect servers to figure out the next hop server to a user s current location. It may be a proprietary corporate database, the DNS, a finger database, etc. Location servers may be collocated with a proxy or a redirect server. They are outside the scope of SIP and we won t explicitly consider this type of SIP server from now on either. UACs and network servers may decide to forward multiple copies of a single incoming request to multiple destinations. This procedure is known as forking. It may for instance be used by the last hop server to send a request to several UASs simultaneously so as to speed up the process of contacting the end-user (also see Messages). The server may use multicast to perform the fork. Messages SIP messages are textual. The header of a SIP message specifies the type of the message, the protocol version, the source address, the destination address, etc. SIP defines 6 types of messages, the most important of which are the REGISTER and INVITE messages. The payload of a SIP message typically consists of an SDP specification. A UAC uses a REGISTER request message to convey the current location of a user to a server. This may for instance be necessary when the user has moved to another machine and wants to receive invitations to join sessions on the new machine. When the server has processed the request, it returns a REGISTER response message to the UAC specifying whether or not the registration succeeded. A UAC sends an INVITE request message on behalf of its user to invite another user to a session. The UAS that the user has registered as being his current location receives the INVITE request. The UAS passes the request to the user and sends back a response when the invited user reacts to the invitation (by rejecting or accepting it). Observe that a user may register at multiple machines at the same time and that, as a consequence, several UASs may simultaneously receive the same INVITE request. This scenario can be useful in various situations, for example when trying to contact any user out of a group (e.g. sales@domain) or when trying to contact a user as soon as possible ( page a user). This scenario also indicates a typical situation in which SIP would use UDP in multicast mode rather then unicast mode. As an example, assume that user logs onto machine pc.telin.nl. The REGISTER request message that the UAC sends to the local SIP server proxy.telin.nl would then read: REGISTER sip:proxy.telin.nl SIP/2.0 Via: SIP/2.0/UDP pc.telin.nl

5 From: sip: To: sip: Contact: <Other SIP headers> Similarly, if user invites user to join a session, then the UAC of the calling user would send the following INVITE request to its local SIP server proxy.telin.nl: INVITE sip:proxy.telin.nl SIP/2.0 Via: SIP/2.0/UDP pc.telin.nl From: sip: To: sip:tom@ctit.utwente.nl <Other SIP headers> <SDP payload> The Via: field lists the SIP entities that the message has visited, at this stage this is only the UAC of the caller. Other message types are ACK (confirms the receipt of an INVITE response), CANCEL (cancels a pending request), BYE (warns that a user will leave a session) and OPTIONS (queries a SIP server for its capabilities). Except for the ACK message, all of these messages consist of request-response pairs. We will not consider these messages any further in the rest of this document. Behavior Figure 5 shows a typical example of SIP s behavior when the server infrastructure consists of proxy servers. The figure shows two domains (telin.nl and ctit.utwente.nl) that each use a proxy server to process SIP messages coming in to or going out of the domain. The proxy servers are named proxy.telin.nl and proxy.ctit.utwente.nl. The figure also shows the message flow when user invites user tom@ctit.utwente.nl to a session. first of all sends an INVITE request (see section Messages for message content) to its local SIP server, proxy.telin.nl (1). Server proxy.telin.nl checks the domain name of the callee (ctit.utwente.nl) and determines the IP address of the SIP server of that domain, typically using the DNS. Server proxy.telin.nl then forwards the request to the SIP server of CTIT (2). This server analyzes the user portion of the callee s address and determines that the user is currently logged onto host ws.ctit.utwente.nl within the CTIT domain (recall that users have to register their current location with a SIP server to be reachable). The server proceeds to determine the IP address of the host and sends the INVITE request to it (3). The UAS on the receiving host processes the request and passes it up to the end-user. Assuming that the end-user accepts the invitation, the UAS sends back an INVITE response indicating that the user is OK with the invitation (4). The INVITE response follows the same path as the corresponding INVITE request (5, 6) and eventually arrives at the UAC of the caller. The UAC then acknowledges the receipt of the INVITE response by sending an ACK message to the UAS of the callee (7, 8, 9). After this, the caller and the callee can exchange subsequent SIP messages or any other data directly (10). proxy.telin.nl telin.nl Internet Backbone 5 pc.telin.nl 9 4 proxy.ctit.utwente.nl 3 ctit.utwente.nl tom@ctit.utwente.nl ws.ctit.utwente.nl Figure 5: SIP behavior using proxy servers. If the servers of domains telin.nl and ctit.utwente.nl are redirect servers, the UAC on pc.telin.nl receives the address of the redirect server at ctit.utwente.nl from its local redirect server. Upon receiving this address, the UAC sends the INVITE request to that server. The redirect server at ctit.utwente.nl then returns the address of host ws.ctit.utwente.nl to the UAC on pc.telin.nl. As a last step, the UAC sends the INVITE request to ws.ctit.utwente.nl directly. If user tom@ctit.utwente.nl accepts the invitation, the UAS of his machine returns an INVITE response to the UAC on pc.telin.nl. The UAC confirms the receipt of the INVITE response by sending back an ACK. The two hosts can communicate directly from that moment on. Figure 6 shows an example of how SIP supports personal mobility. The mobile user in this example is. He moves from a host on his home network (pc.telin.nl) to a host on a foreign network (ws.ctit.utwente.nl) where he wants to receive INVITE requests once he has logged on. To realize this, the UAC on pc.telin.nl sends a REGISTER request to its local SIP server on behalf of (1). The request indicates that will be away from his home network and that the SIP server can reach him at his CTITaddress (say harry@ctit.utwente.nl). The SIP server responds with a REGISTER response. We will assume that it indicates success. then moves to the foreign network and logs onto host ws.ctit.utwente.nl. The UAC on that machine sends a REGISTER request message to its local SIP server indicating that harry@ctit.utwente.nl has just logged onto host ws.ctit.uwtente.nl (3). As before, the server responds with the result of the registration. We will assume that this second registration has succeeded as well. After has registered, another user located somewhere else on the Internet sends an INVITE request to. The request gets routed to proxy.telin.nl (5). This server detects that is away to ctit.utwente.nl, and forwards the INVITE request to proxy.ctit.utwente.nl (6). This server knows the host on which is currently logged on, looks up that host s IP address and sends the request to it (7). The UAS on the host receives the request and finally alerts user.

6 proxy.telin.nl telin.nl Internet Backbone pc.telin.nl 3 4 proxy.ctit.utwente.nl 7 ctit.utwente.nl ws.ctit.utwente.nl Figure 6: Personal mobility with SIP. 3.2 Terminal Mobility with SIP ( Mobile SIP ) Figure 7 shows that SIP supports personal mobility by allowing users to register at different locations over time. [6] has proposed to extend SIP with functions that would support terminal mobility as well. We will see later on that the difference between support for personal mobility and terminal mobility is merely the frequency with which users reregister at different locations. For convenience, we refer to the SIP version that supports terminal mobility as Mobile SIP. Observe that Mobile SIP currently only covers unicast communications. [6] motivates the development of Mobile SIP from the shortcomings of Mobile IP. These include the additional delay that triangular routing may introduce (which may be unacceptable to delay sensitive traffic such as audio); the relatively large header overhead that tunneling introduces for small packets (e.g. audio samples); the fact that home and foreign agents are potential bottlenecks if they have to deal with large amounts of traffic and large amounts of users; the waste of IPv4 addresses if mobile nodes use a collocated careof address; and the drawbacks of route optimization (e.g. the inability to authenticate a mobile node with the correspondent node in a scalable manner, high handoff latencies, the fact that the protocol stack of the correspondent node needs to be changed to support tunneling, etc.). To overcome these problems, Mobile SIP first of all drops Mobile IP s requirement that mobile nodes should have a permanent home address. Instead, mobile nodes get a new IP address whenever they change from one link to the other (e.g. using DHCP [8]). This is similar to the collocated care-of address of Mobile IP, but with Mobile SIP there is no permanent home address. Observe that the consequence of this approach is that TCP connections are broken when a mobile node changes links. In Section 3.3 we will see that Mobile SIP deals with such an event in a pragmatic manner. Mobile SIP furthermore operates in optimized routing mode as follows. On start up, a mobile node obtains an IP address on its current link (home or foreign) and registers it with a SIP server on its home link. For the sake of this discussion, we will assume that the mobile node is on a foreign link when it starts up. We will furthermore follow the notational convention of [6] and refer to an IP address by means of its high level name of the form machine.domain. Once the mobile node has registered, correspondent nodes can contact it. A correspondent node simply sends an INVITE request, which the SIP server infrastructure then routes to the SIP server of the mobile node s home link following standard SIP procedures. Assuming that the SIP server on the home link is a redirect server, it returns the address that the mobile node has registered with. The correspondent node then redirects the INVITE request to the mobile node directly. If the mobile node accepts the invitation, it exchanges further SIP messages as well as any other data directly with the correspondent node from that moment on. Note the similarity with Mobile IP in optimized routing mode. Figure 7 shows an example of the above scenario. When the mobile node roams to another link (1), it first of all gets a new IP address. Assume that in this example this new address is laptop.cs.utwente.nl (recall that we refer to IP addresses by means of their high level names). In order to continue communications between the mobile node and the correspondent node, the signaling association as well as the data transfer association (2) between the two nodes need to be handed off to the mobile node s new IP address. Mobile SIP deals with this situation by having the mobile node send an INVITE request message to the correspondent node (3). The message contains the mobile node s new IP address in the INVITE message s Contact: field to tell the correspondent node where the mobile node wants to receive future SIP messages. This effectively hands off the SIP signaling association between the mobile node and the correspondent node. To also hand off the data transfer association, the mobile node includes its new IP address in the SDP payload of the INVITE messages. Specifically, the mobile node places its new address in the c(onnection)-field of the SDP description. If the correspondent node is OK with both handoffs, it returns an INVITE response indicating this (4). The mobile node, in turn, then responds with an ACK to complete the handoff (5). From that moment on all SIP signaling messages as well as all other traffic again directly flow from the correspondent node to the mobile node and vice versa (6). The mobile node completes the handoff by reregistering its new location (laptop.cs.utwente.nl) with the SIP server on its home link (7). dick@telin.nl pc2.telin.nl telin.nl ctit.utwente.nl laptop.ctit.utwente.nl proxy.telin.nl Figure 7: Terminal mobility with SIP cs.utwente.nl laptop.cs.utwente.nl The INVITE request message that the mobile node sends to the correspondent node looks like this: INVITE sip:dick@telin.nl SIP/2.0 Via: SIP/2.0/UDP laptop.cs.utwente.nl From: sip: To: sip:dick@telin.nl Contact: sip:harry@laptop.cs.utwente.nl <end SIP header, begin SDP payload> c=in IPv4 laptop.cs.utwente.nl <end SDP payload>

7 Observe that the load on a SIP server that supports terminal mobility will generally be higher than the load on a server that does not support this feature. This is because the first kind of server will generally receive more reregistration requests than a server of the second type. 3.3 Mobile SIP with IP and Mobile IP Mobile SIP may be combined with TCP/UDP/IP or with TCP/UDP/Mobile IP. Mobile SIP takes care of the signaling functions in these configurations, whereas TCP/UDP/(Mobile) IP provides the data transfer functions (which Mobile SIP obviously requires as well). The previous section discussed the combination of Mobile SIP and IP. The disadvantage of this configuration is that terminal mobility breaks the TCP connections that are in use by applications on the mobile terminal (e.g. an FTP or HTTP application). For applications that use short-lived TCP connections this is not much of a problem. They can reestablish the connection at relatively low cost. A Web application that uses HTTP 1.0, for instance, will not suffer a whole lot when one or more of its TCP connections break. However, applications that make use of long-lived TCP connections do suffer from connection breakdowns. They cannot reestablish a connection at low cost unless there exists some sort of synchronization mechanism that tells the application at which point during the data transfer the connection got released. In the absence of such a mechanism, the application will have to start the data transfer all over again. An example of an application that belongs to this category is an FTP-based file transfer application. Mobile SIP in combination with Mobile IP does not suffer from the TCP connection problem because Mobile IP supports transparent terminal mobility. However, this combination is inefficient. For instance, both Mobile IP s home agent and the SIP server on the mobile node s home link keep track of the mobile node s current location. This problem could however be solved by collocating the home agent and the SIP server or by allowing the SIP server to query the home agent. In addition to the overhead created by keeping track of mobile terminals at two levels, the combination of Mobile SIP and Mobile IP also wasted IPv4 address space. Actually, this combination reduces Mobile SIP to standard SIP and suffers from all the drawbacks that led to the development of Mobile SIP in the first place. [6] suggests using a configuration that exploits the best of both combinations. That is, they suggest to use Mobile SIP in combination with UDP/IP for delay sensitive applications; Mobile SIP and TCP/IP for applications that use short-lived TCP connections; and TCP/Mobile IP for applications that rely on long-lived TCP connections. Finally observe that Mobile SIP will be easier to deploy than Mobile IP with route optimization. This is because the second requires changes to the operating system (which is where the IP protocol stack typically resides) of correspondent nodes to be able to tunnel packets to the mobile node. Mobile SIP is an application level protocol and does therefore not require such changes. Table 1 lists the main differences between Mobile IPv4 and Mobile SIP. Mobile IPv4 Mobile SIP Mobility type Transparent Non-transparent Signaling level Network Application Messages Byte-oriented Textual Data transfer types Unicast, multicast, and Unicast only broadcast Addresses Fixed home address plus variable care-of address Variable care-of address Routing entities Home agent, foreign agent (optional) and standard IP routers Standard IP routers Routing type Triangular, tunneled Optimized, nontunneled Address updates To home agent To correspondent node and to SIP server on home network Table 2 : Main differences between een Mobile IPv4 and Mobile SIP. 3.4 Observed Open Issues In Section 3.2 we already mentioned that the current version of Mobile SIP only supports handoffs for unicast communications. This section identifies a couple of problems that we foresee with handoffs for multicast communications. Consider the scenario outlined in Figure 7 of Section 3.2, but assume that the mobile and the correspondent node communicate via an IP multicast group of which both nodes are a member. When the mobile node roams to another link, it will get a new IP address. This means that it will have to leave the multicast group with its old address and join the group with its new address. However, when the mobile node detects that it has moved to another link using router advertisements [1], it will have no way of contacting its old multicast router and deliver the IGMP unsubscribe message to it. This means that the multicast router on the mobile node s old link will keep on broadcasting or multicasting messages destined for the mobile node on the node s old link. This is not much of a problem when there are other nodes on that link that happen to be a member of the same multicast group. However, when the mobile node was the last node on the old link that was receiving messages from the multicast group, the multicast router on the old link will keep on sending messages on the old link while there are no hosts that want to receive them. This is a waste of bandwidth, especially on a wireless link. This situation persists until the multicast router on the old link finds out that there are no nodes on the link that are interested in receiving packets from the multicast group. To solve the above problem, the mobile node should be able to send the IGMP unsubscribe message for its old IP address to the old multicast router. This requires the mobile node to record its old IP address as well as the IP address of the old multicast router. The mobile node and the old multicast router should furthermore be able to communicate through a tunnel because IGMP messages only carry an IP multicast address (i.e., 224.x.y.z) and can therefore not be sent to routers directly. Finally, the old multicast router needs to be capable of acting as a representative (i.e., as an agent) of the mobile node. That is, it should be able take unsubscribe messages from the tunnel and transmit them onto the mobile link on behalf of the mobile node. Notice the similarity with sending link-local broadcast packets and multicast packets in Mobile IP. While it is problematic to gracefully leave a multicast group on the old link, it is easy to accomplish the handoff toward the new link. All the mobile node has to do is to join the same multicast group on its new link (provided, of course, the router of the new link is a multicast router). Unlike the unicast

8 situation, the mobile node does not need to send an INVITE message to the correspondent node at the transport level the correspondent node is not aware of the identity of the nodes that it is communicating with anyway. The problem of not being able to gracefully leave a multicast group can be alleviated if the mobile node gets assistance from the link layer technology on its old link. For example, if that link layer technology would be able to notify the mobile node that a handoff was imminent, the mobile node would probably be able to gracefully leave the multicast group on its old link. Observe that the assistance that a mobile node gets from its link layer is part of an overall mobility solution as already suggested by [1] on page Implementation Status and Further Reading An overview of SIP implementations (completed ones as well as implementations in progress) can be found at tations.html. Mobile SIP was being implemented when [6] appeared. This was in August We advise interested readers to first go to tml. This Web page contains a long list of SIP papers that are far more easier to understand than the RFC, especially at first. Most of the references mentioned below can also be found there. References [1] J. Solomon, Mobile IP The Internet Unplugged, Prentice Hall, 1998 [2] Charles E.Perkins, Mobile IP - Design Principles [3] M. Handly, H. Schulzrinne, E. Schooler, J. Rosenberg, SIP: Session Initiation Protocol, RFC 2543, March 1999 [4] H. Schulzrinne, J. Rosenber, The Session Initiation Protocol: Providing Advanced Telephony Services Across the Internet, Bell Labs Technical Journal, Oct-Dec 1998, p [5] H. Schulzrinne, J. Rosenberg, Internet Telephony: Architecture and Protocols An IETF Perspective, Computer Networks and ISDN Systems, Volume 31, Issue 3, p , 1999 [6] E. Wedlund, H. Schulzrinne, Mobility Support using SIP, Second ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM'99), Seattle, Washington, August, 1999 [7] M. Handly, J. Crowcroft, C. Bormann, J. Ott, Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture, Computer Networks and ISDN Systems, Volume 31, Issue 3, p ,, 1999 [8] R. Droms, Automated Configuration of TCP/IP with DHCP, IEEE Internet Computing, July-August 1999, p

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Media Gateway Controller RTP

Media Gateway Controller RTP 1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. Tasuka@Tailyn.com.tw

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. Tasuka@Tailyn.com.tw VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 Tasuka@Tailyn.com.tw 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead

More information

SIP: Protocol Overview

SIP: Protocol Overview SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Multimedia Communications Voice over IP

Multimedia Communications Voice over IP Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony

More information

Sangheon Pack, EunKyoung Paik, and Yanghee Choi

Sangheon Pack, EunKyoung Paik, and Yanghee Choi 1 Design of SIP Server for Efficient Media Negotiation Sangheon Pack, EunKyoung Paik, and Yanghee Choi Multimedia & Communication Laboratory, Seoul National University, Korea ABSTRACT Voice over IP (VoIP)

More information

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives

More information

Session Initiation Protocol

Session Initiation Protocol TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 jpaulo@ipb.pt Eurico Carrapatoso

More information

Internet Services & Protocols Multimedia Applications, Voice over IP

Internet Services & Protocols Multimedia Applications, Voice over IP Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314

More information

Internet Services & Protocols Multimedia Applications, Voice over IP

Internet Services & Protocols Multimedia Applications, Voice over IP Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Alkit Reflex RTP reflector/mixer

Alkit Reflex RTP reflector/mixer Alkit Reflex RTP reflector/mixer Mathias Johanson, Ph.D. Alkit Communications Introduction Real time audio and video communication over IP networks is attracting a lot of interest for applications like

More information

Special Module on Media Processing and Communication

Special Module on Media Processing and Communication Special Module on Media Processing and Communication Multimedia Communication Fundamentals Dayalbagh Educational Institute (DEI) Dayalbagh Agra PHM 961 Indian Institute of Technology Delhi (IITD) New Delhi

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with

More information

Introduction to VoIP Technology

Introduction to VoIP Technology Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol

More information

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion VoIP Jakob Aleksander Libak jakobal@ifi.uio.no 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or

More information

Research Article A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

Research Article A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol Hindawi Publishing Corporation EURA Journal on Wireless Communications and Networking Volume 2008, Article ID 348594, 8 pages doi:10.1155/2008/348594 Research Article A Two-Layered Mobility Architecture

More information

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Onsight Connect Network Requirements V6.1 Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network

More information

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer Mathias Johanson Alkit Communications AB Introduction The Alkit Reflex reflector/mixer system can be set-up to interconnect

More information

Network Convergence and the NAT/Firewall Problems

Network Convergence and the NAT/Firewall Problems Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP Burapha University ก Department of Computer Science 7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

More information

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW 3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

Mobility Support using SIP

Mobility Support using SIP Mobility Support using SIP Elin Wedlund Ericsson elin.wedlund@netinsight.se Henning Schulzrinne Columbia University hgs@cs.columbia.edu ABSTRACT Enabling mobility in IP s is an important issue for making

More information

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff. Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point

More information

Internet Technology Voice over IP

Internet Technology Voice over IP Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every

More information

IP-Telephony Real-Time & Multimedia Protocols

IP-Telephony Real-Time & Multimedia Protocols IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol

More information

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED

More information

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Methods for Lawful Interception in IP Telephony Networks Based on H.323 Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering

More information

hgs/sip2001 Mobility 1 SIP for Mobility

hgs/sip2001 Mobility 1 SIP for Mobility hgs/sip2001 Mobility 1 SIP for Mobility Henning Schulzrinne Dept. of Computer Science Columbia University New York, New York (sip:)schulzrinne@cs.columbia.edu Conference International SIP Paris, France

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) An Alcatel Executive Briefing August, 2002 www.alcatel.com/enterprise Table of contents 1. What is SIP?...3 2. SIP Services...4 2.1 Splitting / forking a call...4 2.2

More information

Wireless Networks: Network Protocols/Mobile IP

Wireless Networks: Network Protocols/Mobile IP Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP

More information

6 Mobility Management

6 Mobility Management Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract

More information

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott

More information

VoIP telephony over internet

VoIP telephony over internet VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)

More information

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

Tunnel Broker System Using IPv4 Anycast

Tunnel Broker System Using IPv4 Anycast Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT

More information

How To. Instreamer to Exstreamer connection. Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection. How To 1.

How To. Instreamer to Exstreamer connection. Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection. How To 1. Instreamer to Exstreamer connection Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection 1.11 Date: 06.03.2013 2013 Barix AG, all rights reserved. All information is subject

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

Implementing Multimedia Sessions. using SIP Architecture

Implementing Multimedia Sessions. using SIP Architecture Implementing Multimedia Sessions using SIP Architecture Prepared By- Prenayan Kaul Kushagra Pant Rana Gaurav Goyal VI th semester, B.E. Computer Science, Netaji Subhash Institute of Technology (NSIT) Abstract

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Integrating Voice over IP services in IPv4 and IPv6 networks

Integrating Voice over IP services in IPv4 and IPv6 networks ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus lambros.lambrinos@cut.ac.cy

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

10 Signaling Protocols for Multimedia Communication

10 Signaling Protocols for Multimedia Communication Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

More Internet Support Protocols

More Internet Support Protocols Domain Name System (DNS) Ch 2.5 More Internet Support Protocols Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

Analysis of Mobile IP in Wireless LANs

Analysis of Mobile IP in Wireless LANs ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang

More information

Mobility Management in DECT/IPv6 Networks

Mobility Management in DECT/IPv6 Networks Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1. Introduction to Session Internet Protocol... 2 2. History, Initiation & Implementation... 3 3. Development & Applications... 4 4. Function & Capability... 5 5. SIP Clients & Servers... 6 5.1.

More information

Session Initiation Protocol and Services

Session Initiation Protocol and Services Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Two-Stage Forking for SIP-based VoIP Services

Two-Stage Forking for SIP-based VoIP Services Two-Stage Forking for SIP-based VoIP Services Tsan-Pin Wang National Taichung University An-Chi Chen Providence University Li-Hsing Yen National University of Kaohsiung Abstract SIP (Session Initiation

More information

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,

More information