Internet Communications Using SIP : Delivering VoIP and Multimedia Services With Session Initiation Protocol {2Nd Ed.}
SIP Servlets SIP Java servlets [7, 8] are a powerful tool for extending the functionality of a SIP client by allowing it to pass ...
</grammar> </field> <filled> <result name=”yes”> <goto next=”#proxy_voicemail”/> </result> & ...
[4] “Information Processing —Text and Office Systems —Standard General- ized Markup Language (SGML)” by ISO (International Organ ...
...
153 Any advanced network must be flexible enough to take into consideration the preferences and desires of users. In this chapte ...
IP communications, by contrast, consider the intelligence, and control resides primarily in user devices. As a consequence, dyna ...
The instructions in the Request-Dispositionheader are explained here. The caller can request the server to: ■■ Proxy—Proxy or re ...
■■ Priority—To specify the priority of the request. ■■ Schemes—To specify which URI schemes the UA supports. ■■ Extensions—To sp ...
Preferences of the Called Party The preferences of the called party are generally invoked by an incoming proxy server that handl ...
References [1] “Caller Preferences for the Session Initiation Protocol (SIP)” by J. Rosenberg, H. Schulzrinne, and P. Kizivat. R ...
159 The Security Considerations Section of RFC 3261 begins with the following: “SIP is not an easy protocol to secure. Its use o ...
Session Setup The main threats to session setup are described in Table 9.1. They are described in terms of their impact on a sin ...
Presence and IM The main threats to presence and IM are described in Table 9.2. They are described in terms of their impact on a ...
Security Mechanisms This section will discuss the security mechanisms that can be used to counter against a number of threats. A ...
SIP can also use certificates for authentication in the same way that web browsers and servers use them. Acertificateis a digita ...
Encryption at the transport layer using TLS is visible at the application. Therefore, a SIP UA that attempts to open a TLS conne ...
Confidentiality can also be done end to end in SIP using Secure Multipur- pose Internet Mail Extensions (S/MIME) [9]. Informatio ...
with each other, but they only accept requests that come through the example .comproxy and, hence, have been authenticated. In t ...
optional feature with SRTP and is provided with an authenticated hash or HMAC. The use of authentication adds an additional 32 o ...
both the SRTP key and the SRTP configuration parameters. However, the SDP needs to have confidentiality provided by SIP, or the ...
«
5
6
7
8
9
10
11
12
13
14
»
Free download pdf