New possibilities for the provision of value-added services in SIP-based peer-to-peer networks
|
|
|
- Aldous Bond
- 10 years ago
- Views:
Transcription
1 New possibilities for the provision of value-added services in -based peer-to-peer networks A.Lehmann 1,2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks, University of Applied Sciences Frankfurt/M., Frankfurt/M., Germany 2 Network Research Group, University of Plymouth, Plymouth, United Kingdom 3 University of Applied Sciences Darmstadt, Darmstadt, Germany [email protected] Abstract Service provisioning in future telecommunication networks, especially value-added services, is becoming more and more important. As a result providers will have to distinguish themselves sharply from their competitors. Newest insights based on the research of peer-topeer networks will present an easy way to service provisioning. Furthermore this paper will present a solution for service discovery and the reuse of still existing services. These solutions are still the basis for future work which will have the goal to create a framework which will provide also the composition of new services in peer-to-peer networks. Keywords NGN,, Value-added services, peer-to-peer networks 1. Introduction Service provisioning, especially value-added services (VAS), will play a key role in Next Generation Networks (NGN). An important distinguishing feature for providers will be the range of new services. This offer is determined by the rising and specified inquiry of the customers. In future customers will demand services which became tailor-made for them. To meet these increasing requirements, one of the critical steps is to implement in the future networks the support for openness towards new services. This will lead to a number of challenges, such as the management of new services, the conditions to be fulfilled by providers to ensure their provisioning, and the impact of involving peer-to-peer (P2P) technologies in such architectures. The aim of this paper is to review and discuss all these challenges Through future networks and their service delivery platforms (SDP) the provision of value-added services will be facilitated. Value-added services are specialized telecommunications services. Their functionality will exceed teleservices, e.g. facsimile or short message service. To provide VAS there is a need for new functions which are not handled by the core network itself. For this purpose further network elements such as application servers (AS) and media servers (MS) are needed as shown in Fig.1.
2 data interfaces HTTP Sensor/Actuator database queries Service logic/control -Interface UA B2BUA Proxy Redirect Media Payload handling TTS SR Mixer Payload RTP Audio/Video Chat Figure 1: Application and Media The application servers will provide the services and will use/control other application servers and/or media servers to realize more complex services. Media servers will provide the handling of payload (e.g. for video conferences). 2. Overview of different peer-to-peer models Based on advantages such as scalability, low costs, and openness for new services peer-to-peer models will play an important role in the future. Thus, we will discuss different peer-to-peer models in this section and will determine their possibilities of service provisioning. Three different models (generations) were proposed by prior research (Eisenschmid, 2005) as shown in Fig.2 (E. Harjula et al., 2004). 1st Generation (Hybrid P2P model): e.g. Napster, Skype, (Session Initiation Protocol) semi-centric (at least one centric checkpoint), e.g. one centric peer as an index server for available data client-server and P2P communication there is no need for specialized tracing service 2nd Generation (Pure P2P model): e.g. Gnutella fully distributed structured (linked to a special topology) or non-structured organization of peers no support for searching by keywords transient peers are not supported 3rd Generation (Super P2P model): e.g. KaZaa, Skype enhancement of the hybrid P2P model centralized checkpoints are substituted by P2P network of super nodes interaction between super nodes and normal peers is based on client-server model
3 distributed Gnutella 1st Generation 2nd Generation 3rd Generation Kazaa JXTA centralized Napster Figure 2: -to-peer Generations A summary of these different peer-to-peer variants is shown in Fig. 3. Hybrid -to--model Pure -to--model Super -to--model Super-Node Figure 3: Overview of different -to- variants With respect to the requirements from the view of public communication networks the different P2P variants have been analyzed within the research project TeamCom (Lehmann, 2008). In this connection the hybrid P2P model is favored by the networks view listed in Table 1 (Lehmann, 2008). Requirements Hybrid P2P Super P2P Pure P2P Openness for new services Teleservices
4 Supplementary services Value-added services Mobility Regulatory Requirements Integrated Security Functions appropriate charging for services Table 1: Requirements for Networks The above shown table is only an extract of the requirements list developed in the project. But this extract already illustrates the preferences of the hybrid model. Major criteria e.g. mobility (service mobility, session mobility and personal mobility), compliance to regulatory requirements (such as lawful interception), integrated security functions (such as authentication or encryption of payload and signalling) and appropriate charging for services are better supported by the hybrid P2P model than by the distributed variants. Furthermore we will have a look on the architecture of such a hybrid model for service provisioning. 3. Service provisioning in Hybrid P2P model Based on the specification (Rosenberg et al., 2002) a hybrid P2P model can be realized. essentially supports P2P communication as shown in Fig. 3 because a clearly specified client-server model does not exist. According to (Rosenberg et al., 2002) a hybrid P2P model has already been defined as shown in Fig. 4. Based on the typical elements (User Agent, Proxy, Registrar, and Location ) a P2P infrastructure can be realized. This infrastructure already enables client-to-client communication as shown in Fig. 4. Proxy Location Registrar 4. INVITE OK 5. lookup 2. Register 9. ACK OK 6. INVITE 1. REGISTER User A 10. data/audio/video 11. BYE User B OK OK Figure 4: -based client-to-client communication
5 As shown in Fig. 4, the Registrar and Proxy servers are only needed to lookup the location of the callee ( User Agent B). Therefore the temporary URI (Uniform Resource Identifier) is resolved to route the initial requests (INVITE and 200 OK). It is obvious that the three-way-handshake (by sending ACK) is completed directly between the single peers respectively clients. From this point all data (payload and signalling) will be exchanged in peer-to-peer manner. Such a hybrid P2P infrastructure can be used to provide quick and easy services, especially value-added services. First a P2P overlay composed of Registrar/Proxy servers has to be created. The domain for these elements can be resolved by DNS (Domain Name System) (Mockapetris, 1987, I), (Mockapetris, 1987, II) or dynamic DNS (Vixie et al., 1997). Now further network elements can simply register with the overlay network. A pool of location servers is connected to the overlay. The location server pool is holding the data of the registrations from the peers to provide the routing. Now application servers and media servers can easily be connected to the overlay as peers to provide value-added services. An overview of this architecture is presented in Fig. 5. Location DNS Proxy/Registrar e.g. Diameter Domain A 1 2 n s User Agent + Application User Agent Application Media Figure 5: Hybrid P2P Model The general architecture of NGN is presented in Fig. 6. The described hybrid P2P model can represent a special characteristic of NGN.
6 AS Service Delivery Platform Application Stratum User Equipment, UA Location CS Service Stratum other NGN MS Access network with QoS z.b. Fachhochschule RTP Frankfurt am Main University of Transport Applied Sciences Stratum Forschungsgruppe und Labor für Telekommunikationsnetze RTP IP core network with QoS e.g. RTP Figure 6: NGN architecture as a strata-structure To manage the addressability of application and media servers by their URI these servers also have to register with the overlay network. This architecture offers the following benefits: usage of existing specifications such as, DNS non-modified standard User Agents can be used (based on the specification) fast lookups (resolving the temporary URI from the permanent URI) are provided better than by pure P2P models bottlenecks and single points of failure are eliminated possibility for more complex searching possibility to register and deregister new services reduction of expenses scalability To offer access to the new services to end users implemented in application servers, application servers must be extended by a new functionality. An application server uses the request REGISTER, such as a Digest (Rosenberg et al., 2002), in order to register with the network. To sign on implemented services the same request as shown above is used (Schmidt et al., 2006). The URI to use for registration and authentication respectively originates from the subdomain model (e.g. "sub.domain.de"). The following example will clarify the usage. Assuming that an application server has registered the following URI "as1@domaina", he sends the following request to the Proxy resolved by DNS: REGISTER sip:domaina /2.0
7 To: Contact: Expires: 3600 By using the model presented in Fig. 7 registered application servers can provide any number of services. The header field "Expires:" sets the period of time for the validity of the registration which in this case is valid for one hour. As a result the application server has to register the service in defined intervals of time to set the service accessible. With the same request the service can also be deregistered from the network, setting the header field "Expires:" to "0". AS1 DNS CS Location Domain Query REGISTER servicex.as1@domaina Service Registration 200 OK Figure 7: Service registration in hybrid P2P model The provided services hosted by the application servers can be easily applied and User Agents or other application servers can make use of them. This mechanism fully supports "openness for new services". The next section will describe the procedures used for publishing and discovery of services. 4. Service Publishing and Discovery Publishing and discovery of services is an essential part of a service provisioning architecture as mentioned before. To realize an architecture which supports publishing and discovery of services the overlay network has to be extended with some new features. During the past years the Internet Engineering Task Force (IETF) has standardized and several extensions, particularly the event framework (Roach, 2002) as an architecture for status delivery from and to any host in IPnetworks and the extension for event state publication (Niemi, 2004). Using these standards it is possible to create such a service provisioning architecture. For realizing the publication of new services the PUBLISH method will be used. The body of this method contains the service description (such as the service name, human readable service description, service id, and service URI) specified by the use of XML (Extensible Markup Language) (Rahman et al., 2006). The
8 PUBLISH method is sent to the overlay network. The Proxy /Registrar servers are extended by a so-called event server to support the publishing and discovery of services. All information belonging to the events are hosted by the event server (see Fig.8). To realize the discovery functionality two further messages are used, namely SUBSCRIBE and NOTIFY. The message SUBSCRIBE will be used to do a service query and the message NOTIFY will be used to answer the service query. In the following the service discovery is described. A subscriber (here: UA) sends the SUBSCRIBE message to initially subscribe to an event (here: service query) and receives NOTIFY for the initial notification (here: service information) and all subsequent messages that relate to this subscription. Each subscription carries a desired lifetime of the subscription. In case of a lifetime of zero, the event server merely sends back all available and matching services at this point of time. If the lifetime is greater zero, an availability subscription to services in the future is established (Rahman et al., 2006; Trossen and Pavel, 2005). The concluding hybrid P2P architecture is shown in Fig.8. Location DNS Proxy/Registrar /Event s e.g. Diameter Domain A 1 2 n SUBSCRIBE 200 OK NOTIFY 200 OK PUBLISH s 200 OK UA AS Figure 8: Hybrid P2P architecture for service provisioning and discovery As an example the messages PUBLISH, SUBSCRIBE and NOTIFY are shown in the following. PUBLISH sip:[email protected] /2.0 To: < sip:[email protected]> From: < sip:[email protected]>;tag=1234 Expires: 3600 Event: x-servinfo Content-Type: application/servinfo+xml Content-Length:... [Published document] SUBSCRIBE sip:[email protected] /2.0 To: < sip:[email protected]> From: <sip:[email protected]>;tag=4567
9 Event: x-servinfo Accept: application/servinfo+xml Expires: 0 Content-Length: 0 NOTIFY sip:[email protected] /2.0 To: <sip:[email protected]>;tag=4567 From: < sip:[email protected]> Event: x-servinfo Content-Type: application/servinfo+xml Content-Length:... [Published document] Within the research project TeamCom (Lehmann, 2008) the above described architecture shown in Fig. 5 will be realized with the JAIN (Java APIs for Integrated Networks) SLEE (Service Logic and Execution Environment). This API (Application Programming Interface) uses SBBs (Service Building Block), which may represent services. These SBBs can also be shared via the presented model. Within the body of both PUBLISH and NOTIFY methods the location (e.g. an FTP (File Transfer Protocol) URI) from where the SBB can be obtained can be included, so that other peers may use these SBB and deploy it on their own application servers to also provide the same service. 5. Conclusion With the approaches presented in this paper any service provider has the ability to easily make new value-added services accessible for users or other providers. Users can search for new services for their own use or implementation. Also the whole architecture benefits from the advantages provided by the P2P networks. Furthermore the presented architecture should be verified against still existing centralised models. 6. Annotation The research project providing the basis for this publication was partially funded by the Federal Ministry of Education and Research (BMBF) of the Federal Republic of Germany under grant number 1704B07. The authors of this publication are in charge of its content. 7. References Eisenschmid, W. (2005), "-to--architekturen", Universität Ulm - Ulm University, Proseminar Virtuelle Präsenz E. Harjula et al. (2004), "Plug-and-Play Application Platform: Towards Mobile -to-", 3rd International conference on Mobile and Ubiquitous multimedia (MUM2004), College Park, Maryland, USA
10 Lehmann, A., Eichelmann, E., Trick, U. (2008), "Neue Möglichkeiten der Dienstebereitstellung durch -to--kommunikation", 13. VDE/ITG Mobilfunktagung Osnabrück Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E. (2002), RFC 3261, ": Session Initiation Protocol", IETF Mockapetris, P. (1987), (I), RFC 1034, "DOMAIN NAMES - CONCEPTS AND FACILITIES", IETF Mockapetris, P. (1987), (II), RFC 1035, "DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION", IETF Vixie, P., Thomson, S., Rekhter, Y., Bound, J. (1997), RFC 2136, "Dynamic Updates in the Domain Name System (DNS UPDATE)", IETF Schmidt, H., Guenkova-Luy, T., Hauck, F.J. (2006), "Service Location using the Session Initiation Protocol ()", International conference on Networking and Services (ICNS) Roach, A. B. (2002), RFC 3265, "Session Initiation Protocol ()-Specific Event Notification", IETF Niemi, A. (2004), RFC 3903, "Session Initiation Protocol () Extension for Event State Publication", IETF Rahman et al. (2006), "Service Discovery using Session Initiation Protocol ()", United States Patent Application Publication Trossen, D., Pavel, D. (2005), "Service discovery & availability subscriptions using the event framework", IEEE International Conference on Communications
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System
1 SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System David A. Bryan and Bruce B. Lowekamp Computer Science Department College of William and Mary Williamsburg, VA 23185 {bryan, lowekamp}@cs.wm.edu Abstract
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Bridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 [email protected]
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL
AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 [email protected] Eurico Carrapatoso
Developing and Integrating Java Based SIP Client at Srce
Developing and Integrating Java Based SIP Client at Srce Davor Jovanovi and Danijel Matek University Computing Centre, Zagreb, Croatia [email protected], [email protected] Abstract. In order
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem
GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document
Programming SIP Services University Infoline Service
Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs
Chapter V SIP Technology For Value Added Services (VAS) in NGNs http://users.encs.concordia.ca/~glitho/ Outline 1. SIP 2. SIP servlets 3. Examples of services that may be implemented with SIP technology
Creation of value added services in NGN with BPEL
Creation of value added services in NGN with BPEL T.Eichelmann 1, 2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks, University of Applied Sciences Frankfurt/M., Frankfurt/M.,
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Sangheon Pack, EunKyoung Paik, and Yanghee Choi
1 Design of SIP Server for Efficient Media Negotiation Sangheon Pack, EunKyoung Paik, and Yanghee Choi Multimedia & Communication Laboratory, Seoul National University, Korea ABSTRACT Voice over IP (VoIP)
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan [email protected]
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
A Decentral Architecture for SIP-based Multimedia Networks
A Decentral Architecture for SIP-based Multimedia Networks Holger Schmidt, Teodora Guenkova-Luy, and Franz J. Hauck Institute of Distributed Systems, Ulm University, Germany {holger.schmidt,teodora.guenkova-luy,franz.hauck}@uni-ulm.de
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING
Journal of Engineering Science and Technology Vol. 10, No. 2 (2015) 174-183 School of Engineering, Taylor s University I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
A P2PSIP event notification architecture
A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: [email protected] Alisa Devlic Appear Networks AB,
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
Radius/LDAP authentication in open-source IP PBX
Radius/LDAP authentication in open-source IP PBX Ivan Capan, Marko Skomeršić Protenus d.o.o. Telecommunications & networking department Zrinskih i Frankopana 23, Varaždin, 42000, Croatia [email protected],
VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
10 Signaling Protocols for Multimedia Communication
Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services Harry G. Perros Computer Science Department NC State University, Raleigh 27695 USA Email: [email protected]
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part
Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment Mr. S.Thiruppathi
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
An Evaluation of Architectures for IMS Based Video Conferencing
An Evaluation of Architectures for IMS Based Video Conferencing Richard Spiers, Neco Ventura University of Cape Town Rondebosch South Africa Abstract The IP Multimedia Subsystem is an architectural framework
Session Initiation Protocol (SIP) Chapter 5
Session Initiation Protocol (SIP) Chapter 5 Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
A Peer-to-peer Secure VoIP Architecture
A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 ) Contribution Title: Implementing ESMI with SIP and ESTP Contribution Number: Submission
RELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf [email protected] Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...
VoIP Conference Server Evgeny Erlihman [email protected] Roman Nassimov [email protected] Supervisor Edward Bortnikov [email protected] Software Systems Lab Department of Electrical
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Network Applications
Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
SIP meets ZigBee. Slobodanka Tomic and Petia Todorova
SIP meets Slobodanka Tomic and Petia Todorova Abstract In the paper presented we put together the framework of SIP, which is the protocol of choice for Next Generation Networks (NGN) and has been gradually
A SIP-based Device Communication Service for OSGi Framework
A -based Communication for OSGi Framework Dennis Bushmitch Wanrong Lin Andrzej Bieszczad Alan Kaplan Panasonic Technologies 2 Research Way, 3 rd Floor Princeton, New Jersey 08540, USA db, wanrong, ajb,
For internal circulation of BSNL only
E1-E2 E2 CFA Session Initiation Protocol AGENDA Introduction to SIP Functions of SIP Components of SIP SIP Protocol Operation Basic SIP Operation Introduction to SIP SIP (Session Initiation Protocol) is
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto ([email protected]) CONTENTS Why P2P? The P2P Overlay
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, Email, Collaboration, IM www.communigate.com
CommuniGate Pro Real-Time Features CommuniGate Pro for VoIP Administrators Audience: Server Administrators and Developers Focus: CommuniGate Pro as the Signaling platform Method: Understanding CommuniGate
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Decentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
SIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania [email protected] Abstract.
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Enabling SIP-Based Services in Ad Hoc Networks
Enabling SIP-Based Services in Ad Hoc Networks Heng-Te Chu 1, 2, Wen-Shiung Chen 1 1 VIPCCL, Dept. of Electrical Engineering, National Chi Nan University, Nan-Tou, Taiwan 2 Dept. of Information Networking
A business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
